EP2403206A1 - Multi-service vpn network client for mobile device having integrated acceleration - Google Patents

Multi-service vpn network client for mobile device having integrated acceleration Download PDF

Info

Publication number
EP2403206A1
EP2403206A1 EP11169538A EP11169538A EP2403206A1 EP 2403206 A1 EP2403206 A1 EP 2403206A1 EP 11169538 A EP11169538 A EP 11169538A EP 11169538 A EP11169538 A EP 11169538A EP 2403206 A1 EP2403206 A1 EP 2403206A1
Authority
EP
European Patent Office
Prior art keywords
vpn
network
handler
mobile device
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP11169538A
Other languages
German (de)
French (fr)
Other versions
EP2403206B1 (en
Inventor
Yin Wei
Subramanian Iyer
Richard Campagna
James Wood
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pulse Secure LLC
Original Assignee
Juniper Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Juniper Networks Inc filed Critical Juniper Networks Inc
Publication of EP2403206A1 publication Critical patent/EP2403206A1/en
Application granted granted Critical
Publication of EP2403206B1 publication Critical patent/EP2403206B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment

Definitions

  • the invention relates to cellular networks and, more particularly, to cellular-based network data services.
  • a typical cellular radio access network is a collection of cells that each include base stations capable of transmitting and relaying radio signals to subscribers' mobile devices.
  • a "cell” generally denotes a distinct area of a cellular network that utilizes a particular frequency or range of frequencies for transmission of data.
  • a typical base station is a tower to which are affixed a number of antennas that transmit and receive the data over the particular frequency.
  • Mobile devices may transmit radio signals at the designated frequency to the base stations to initiate cellular telephone calls or packet-based data services.
  • cellular service providers convert the cellular signals, e.g., Time Division Multiple Access (TDMA) signals, Orthogonal Frequency-Division Multiplexing (OFDM) signals or Code Division Multiple Access (CDMA) signals, received from mobile devices at the base stations into Internet protocol (IP) packets for transmission within packet-based networks.
  • TDMA Time Division Multiple Access
  • OFDM Orthogonal Frequency-Division Multiplexing
  • CDMA Code Division Multiple Access
  • endpoint devices can inadvertently spread malicious software to the servers and possibly to other endpoint devices.
  • endpoint security and connectivity software applications are added to each end user mobile device, the potential for problems and network conflicts increases. It is currently very difficult for information technology (IT) staff to enable network connectivity for users from any device, at any time, from virtually anywhere, without requiring significant end-user interaction with complex technologies.
  • IT information technology
  • an integrated, multi-service network client for cellular mobile devices. For example, techniques are described by which a single software package can be easily deployed on mobile network devices to provide integrated secure enterprise virtual private network (VPN) connectivity, network acceleration, security management including monitored and enforced endpoint compliance, and collaboration services.
  • the integrated, multi-service client may be deployed as a single package downloadable from a standard application (“app") deployment mechanism, such as an electronic store or other repository for user applications, provided by a manufacturer of a mobile device.
  • the multi-service client integrates with an operating system of the device so as to provide a single entry point for user authentication for secure enterprise connectivity, endpoint security services including endpoint compliance with respect to anti-virus and spyware software, acceleration, and comprehensive integrity checks.
  • the multi-service client provides a common user interface to the integrated services, and provides a VPN handler that operates as the entry point for network traffic to which the integrated services are to be applied.
  • the multi-service client allows enterprise and service provider IT staff to reduce the number of software agents required and installed on employee devices, thus minimizing potential software conflicts and reducing deployment costs. Further, if additional software, add-ons, or other capabilities are required for a connection, the multi-service network client may automatically download and installs those components without any end user or administrator interaction.
  • the multi-service network client described herein may integrate several services into one, comprehensive, multi-service client, thus simplifying maintenance, administration, and deployment of network clients. Enterprises may no longer have to deal with separately managed and administered agents. Moreover, the techniques may simplify end user experience and reduce help desk time and administrative expense.
  • a cellular mobile device comprises a transmitter and receiver to send and receive cellular communications in the form of radio frequency signals, a microprocessor, and an operating system executing on the microprocessor to provide an operating environment of application software.
  • the cellular mobile device further comprises a multi-service client registered with the operating system as a single application.
  • the multi-service network client comprises a VPN handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device.
  • the multi-service network client further includes a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets, and a VPN control application that provides a unified user interface that allows a user to configure the VPN handler and the data acceleration module.
  • a non-transitory computer-readable medium stores a downloadable distribution package comprising software program code to execute a multi-service network client on a processor within a cellular device.
  • the multi-service network client comprises a virtual private network (VPN) handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device.
  • the multi-service network client further includes a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets, and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the data acceleration module.
  • FIG. 1 is a block diagram illustrating an example system in which a secure VPN gateway of an enterprise provides secure access to protected resources of an enterprise network for both endpoint computing devices and cellular mobile devices.
  • FIG. 2 shows an example login web page presented to the user via the web browser when accessing the secure VPN gateway via an endpoint computing device.
  • FIG. 3 shows an example user home web page presented to the user via the web browser when accessing the secure VPN gateway via an endpoint computing device.
  • FIG. 4A is a block diagram of an example embodiment of a cellular mobile device having a multi-service network client in accordance with the techniques described herein.
  • FIG. 4B is a block diagram of a second example embodiment of a cellular mobile device a multi-service network client in accordance with the techniques described herein.
  • FIG. 4C is another block diagram of the computing system of FIG. 1 and shows the example mobile devices utilizing multi-service network client for both enterprise connectivity and non-enterprise connectivity.
  • FIGS. 5-14 are schematic diagrams illustrating a front view of one embodiment of a cellular mobile device and show a number of displays presented by the multi-service network client deployed on the cellular mobile device.
  • FIG. 15 is an example user interface 190 presented by secure VPN gateway.
  • FIG. 1 is a block diagram illustrating an example system 10 in which secure VPN gateway 12 provides secure access to protected resources 14 of enterprise network 16. That is, secure VPN gateway 12 enables secure and controlled access to resources provided by enterprise network 16. For example, endpoint computing devices (“ECDs”) 18A-18M and cellular mobile devices 19A-18N remotely access enterprise network 16 via service provider network 20 and an intermediate packet data network 21, such as the Internet.
  • ECDs endpoint computing devices
  • service provider network 20 an intermediate packet data network 21, such as the Internet.
  • secure VPN gateway 12 is a secure sockets layer VPN (SSL VPN) device that provides VPN services to clients. Further details on SSL VPN appliances and operations are found in " Juniper Networks Secure Access Administration Guide, Release 6.5," Juniper Networks, Inc., 2008 , which is incorporated herein by reference in its entirety.
  • Secure VPN gateway 12 may be a standalone appliance or may be hosted on one or more other devices, such as an intrusion detection and prevention (IDP) system, a firewall, a unified threat management (UTM) device, a router, or other network device.
  • IDP intrusion detection and prevention
  • UDM unified threat management
  • Enterprise network 16 provides access to sensitive data and services that are accessible only to certain authorized users of the enterprise.
  • the users may access enterprise network 16 by authentication to secure VPN gateway 12 and establishing a communication channel through service provider network 20.
  • secure VPN gateway 12 may use secure VPN gateway 12 to discriminate access to enterprise network 16 by individual employees based on employee authorization.
  • system 10 enables remote access to protected resources 14 of enterprise network 16.
  • Each of protected resources 14 may be, for instance, a web server, an application server, a database server, a file server, an application, an employee workstation, a native messaging or email client, or other electronic resource.
  • endpoint computing devices 18 may be personal computers, laptop computers or other type of computing device associated with individual employees or other authorized users.
  • cellular mobile devices 19 provide a platform for both cellular phone calls and cellular-based access to computer data services. That is, each of mobile devices 19 is a wireless communication device capable of cellular communications.
  • Mobile devices 19 may comprise, for example, a mobile telephone, a laptop or desktop computer having, e.g., a 3G wireless card, a wireless-capable netbook, a video game device, a pager, a smart phone, or a personal data assistant (PDA).
  • PDA personal data assistant
  • Each of mobile devices 19 may run one or more applications, such as mobile calls, video games, videoconferencing, and email, among others.
  • Service provider network 20 also provides network access, data transport and other services to mobile devices 19.
  • Service provider network 20 includes radio access network 25 in which one or more base stations communicate via radio signals with mobile devices 19.
  • Backhaul network (“BN") 27 is a transport network that enables base stations of radio access network to exchange packetized data with mobile core network 31 of the service provider, ultimately for communication with broadband network 29 and packet data network 21.
  • Backhaul network 27 typically comprises communication nodes interconnected by communication links, such as leased land-lines or point-to-point microwave connection.
  • the communication nodes comprise network, aggregation, and switching elements that execute one or more protocols to route packets between base stations and gateway device ("GW”) 28 of mobile core network 31.
  • GW gateway device
  • backhaul network 27 may comprise a GSM radio access network (GRAN) or a Universal Mobile Telephony Service (UMTS) terrestrial radio access network (UTRAN) operating according to respective radio access network standards set forth by the relevant standards-setting body (e.g., 3 GPP).
  • GRAN GSM radio access network
  • UMTS Universal Mobile Telephony Service
  • UTRAN Universal Mobile Telephony Service terrestrial radio access network
  • Mobile core network 31 provides session management, mobility management, and transport services between backhaul network 27 and broadband network 29 to support access, by mobile devices 19, to packet data network 21 and services of protected resources 14.
  • Mobile core network 31 may comprise, for instance, a general packet radio service (GPRS) core packed-switched network, a GPRS core circuit-switched network, an IP-based mobile multimedia core network, or another type of transport network.
  • GPRS general packet radio service
  • Mobile core network 7 comprises one or more packet processing nodes to support firewall, load balancing, billing, deep-packet inspection (DPI), and other services for mobile traffic traversing the mobile core network.
  • DPI deep-packet inspection
  • endpoint computing devices 18 connect to network access device 36 via network switch 38.
  • network switch 38 may comprise digital subscriber line access multiplexers (DSLAMs) or other switching device.
  • DSLAMs digital subscriber line access multiplexers
  • Each of endpoint computing devices 18 may utilize a Point-to-Point Protocol (PPP), such as PPP over ATM or PPP over Ethernet (PPPoE), to communicate with network switch 38.
  • PPP Point-to-Point Protocol
  • one of endpoint computing devices 18 may request access to broadband network 29 and provide login information, such as a username and password, for authentication by authentication device ("AD") 30.
  • PPP may be supported on lines such as digital subscriber lines (DSLs) that connect endpoint computing devices 18 with network switch 38.
  • DSLs digital subscriber lines
  • endpoint computing devices 18 may utilize a non-PPP protocol to communicate with network switch 38.
  • Other embodiments may use other lines besides DSL lines, such as Ethernet over a T1, T3 or other access link.
  • Network switch 38 may communicate with network access device 36 over a physical interface supporting various protocols, e.g., ATM interface supporting ATM protocols.
  • Network access device 36 typically includes Broadband Remote Access Server (BRAS) functionality to aggregate output from switches into a higher-speed uplink to broadband network 29.
  • BRAS Broadband Remote Access Server
  • network access device 36 may comprise a router that maintains routing information between endpoint computing devices 18 and broadband network 29.
  • Secure VPN gateway 12 intermediates access by endpoint computing devices 18 and mobile devices 19 to protected resources 14.
  • secure VPN gateway 12 terminates incoming access requests and connections at the application layer of the Open System Interconnection (OSI) reference model or of the TCP/IP model.
  • OSI Open System Interconnection
  • secure VPN gateway 12 operates as an application-layer proxy to protect protected resources 14 from direct exposure to packet data network 21.
  • Secure VPN gateway 12 receives incoming access requests encapsulated in a packet, decapsulates the access requests to reach the underlying application data, and sends the application data comprising the access requests to requested protected resources 14.
  • secure VPN gateway 12 allows direct connections between layers of the OSI reference model or of the TCP/IP model.
  • secure VPN gateway 12 exchanges data using a secure channel negotiated with the requesting one of endpoint computing devices 18 or mobile devices 19.
  • Secure VPN gateway 12 receives a secure request via the secure channel and makes requests to the appropriate one of protected resources 14 on behalf of the requesting client to establish a data connection between the requesting device and the requested protected resource 14.
  • an endpoint computing device 18 or a mobile device 19 establishes a data connection to secure VPN gateway 12.
  • Each of the data connections may comprise, for example, a secure data connection conforming to a security scheme, such as Secure Sockets Layer (SSL) or Internet Protocol Security (IPSec) protocols.
  • SSL VPN Secure Sockets Layer
  • IPSec Internet Protocol Security
  • an SSL VPN may be used to tunnel IP packets on top of a Layer 4 connection oriented protocol, e.g., Transmission Control Protocol (TCP).
  • TCP Transmission Control Protocol
  • an IPSec VPN may be established to tunnel encrypted IP packets, i.e., Encapsulation Security Payload (ESP) packets, on top of a connection-less protocol, e.g., IP or User Datagram Protocol (UDP).
  • ESP Encapsulation Security Payload
  • secure VPN gateway 12 may require user credentials to establish authentication and authorization. Credentials may include, for example, a username-password pair, a biometric identifier, a data stored on a smart card, a one-time password token or a digital certificate. Based on the provided credentials, secure VPN gateway 12 authorizes or denies access to enterprise network 16. Secure VPN gateway 12 may use an authentication, authorization and accounting (AAA) server to authenticate the credentials. The AAA server may execute on secure VPN gateway 12 or on a separate network device and may be, for example, a Remote Authentication Dial-In User Service (RADIUS) server. Secure VPN gateway 12 and the remote device may also negotiate other aspects of data connection 14 that ensure security, including the type/version of an encryption algorithm, and symmetric keys for encrypting/decryption data transported via data connection 14.
  • AAA authentication, authorization and accounting
  • a user associated with one of endpoint computing devices 18 may direct a web browser executing on the endpoint computing device to an address Uniform Resource Locator (URL) associated with the enterprise.
  • URL Uniform Resource Locator
  • secure VPN gateway 12 presents a web page on the endpoint computing device via the web browser to capture the credentials required from the user.
  • FIG. 2 shows an example login web page presented to the user via the web browser when accessing secure VPN gateway 12 via an endpoint computing device 18.
  • secure VPN gateway 12 presents a default user home web page on the endpoint computing device via the web browser.
  • FIG. 3 shows an example user home web page presented to the user via the web browser when accessing secure VPN gateway 12 via an endpoint computing device 18.
  • the web page presents a list of bookmarks that allow the user to easily navigate protected resources 14 using HTTP links.
  • FIG. 3 shows a first link 42 to an intranet file server provided by the enterprise and a second link 44 to enterprise web mail for the user.
  • cellular mobile devices 19 each include a multi-service network client that, among other services, allows secure VPN connection to easily be provisioned and established over radio access network 25 of service provider network 20.
  • Other applications running on mobile devices 19 may utilize the VPN connections to access services offered by protected resources 14. That is, cellular mobile devices 19 and secure VPN gateway 12 provide secure VPN services to applications running on the mobile device.
  • each mobile device 19 includes a secure access application that provides integrated, anytime/anywhere connectivity, acceleration, and security in a manner that simplifies user experience. For example, upon downloading the secure access application, users of mobile devices 19 may no longer need to interact with network access and security software. From any location, users simply supply their credentials and the secure access application interacts with secure VPN gateway 12 to handle all provisioning and deployment.
  • the secure access software on mobile devices 19 enables fast, easy, secure access to corporate networked and cloud-based data and applications from mobile devices and smart phones. Enterprises and service providers can deploy granular role and device-based security policies when provisioning mobile handset access.
  • the secure access software on mobile devices 19 provides a single, unified client for VPN remote access, WAN acceleration, and endpoint compliance.
  • the secure access software may eliminate the expense and administrative burden of deploying, configuring, and maintaining separate clients.
  • the secure access software on mobile devices 19 may use location-aware intelligent session migration to deliver accelerated, secure, anytime/anywhere network and application access automatically. For example, the software may seamlessly migrate from one access method to another based on the user's location, and accelerates secure access to network resources based on user identity and role.
  • FIG. 4A is a block diagram of an example embodiment of mobile device 19 that operates in accordance with the techniques described herein.
  • mobile device 19 includes a hardware 62 that provides core functionality for operation of the device.
  • Hardware 62 may include one or more programmable microprocessors 70 configured to operate according to executable instructions (i.e., program code), typically stored in a computer-readable medium such as static, random-access memory (SRAM) device or Flash memory device.
  • Transmitter 72 and receiver 74 communicate with other communication devices via a wireless communication, such as high-frequency radio frequency (RF) signals.
  • Hardware 62 may include additional discrete digital logic or analog circuitry.
  • Operating system 64 executes on microprocessor 70 and provides an operating environment for one or more applications (commonly referred to "apps").
  • O/S interface 66 proves an interface layer of software capable of making kernel calls into operating system 64.
  • O/S interface 66 provides a framework within which VPN handler 68 operates and may, for example, allow VPN handler 68 to execute within a "user" space of the operating environment provided by mobile device 19.
  • O/S interface 66 may allow other forms of protocol handlers to be "plugged in” for interfacing with operating system 64.
  • O/S interface 66 interacts with operating system 64 to provide OS-level support for protocol-specific handlers.
  • O/S interface 66 may, for example, provide access to lower levels of the OSI stack for routing packets to and from the VPN connection, ensuring DNS resolvers are set correctly for the VPN, and the like. As shown in FIG. 4A , O/S interface 66 routes inbound low-level packets and outbound application-layer communications to VPN handler 68 for processing. At this time, VPN handler 68 registers with operating system 64 to provides a single point of entry for network traffic so as to transparently apply VPN services and security services without requiring registration of multiple agents with operating system 64 or separate administration of those agents.
  • executable code for VPN handler 68, VPN control application 80 and security manager 84 may be distributed as a single distribution package 67 that is downloadable from a standard "app" deployment mechanism, such as provided by a server associated with an electronic store or other repository for user applications, provided by a manufacturer of mobile device 19. That is, VPN handler 68, VPN control application 80 and security manager 84 may be integrated into a multi-service client for mobile device 19 to allow easy deployment.
  • An application management utility on the cellular mobile device may, for example, issue a request to the server and, in response receive distribution package for processing and installation on the mobile device.
  • VPN handler 68 provides all low-level communication handling for access to enterprise network 16 via secure VPN gateway 12. For example, VPN handler 68 handles interaction and authentication to VPN gateway 12, establishment and deconstructing of a secure data connection conforming to a security scheme, such as SSL or IPSec protocols, and the formation of encrypted outbound packets to be tunneled and the processing of inbound packets to decrypt those packets received from the tunnel. In one embodiment, VPN handler 68 supports both SSL and IPSec protocols and, as described in further detail below, may intelligently and dynamically switch between the two depending upon the state of the VPN connection to VPN gateway 12.
  • a security scheme such as SSL or IPSec protocols
  • VPN control application 80 provides user interface by which a user is able to configure and manage VPN handler 68 as well as other services integrated within the multi-service client, including security manager 84.
  • VPN control application 80 allows a user to submit credentials and instruct VPN handler 68 to dynamically instantiate a secure VPN connection with secure VPN gateway 12 or deconstruct an existing VPN connection.
  • VPN control application 80 provides an interface that translates communications with secure VPN gateway 12 such that the information typically available to the user over a web browser (e.g., FIGS. 2 and 3 described above), are dynamically rendered in a user interface presentable in native format on mobile device 19.
  • VPN control application 80 may dynamically parse HTML links and other information from Hypertext Transfer Protocol Secure (HTTPS) responses from secure VPN gateway 12 and render a window suitable for display on mobile device 19 using input mechanisms (e.g., icons, radio buttons) native to the device.
  • HTTPS Hypertext Transfer Protocol Secure
  • the user can interact directly with the U/I of VPN handler 68 as if the user where accessing his or her default web page normally presented by VPN gateway 12 via an HTML web page.
  • the user may interact with VPN handler 68 to select icons that have been dynamically constructed to correspond to the HTML bookmarks of the user's home web page.
  • the user can, for example, engage an input button corresponding to an administrator-defined link 44 to access web mail as if the user was using a web browser.
  • VPN handler 68 may launch an email application provided by, and thus native to, mobile device 19 as if the email bookmark with the web-based home page were selected by the user.
  • VPN handler 68 receives application-layer data from user applications 82 that has been redirected to the VPN handler via O/S interface 66.
  • VPN handler 68 encapsulates the application-layer data to secure packets for tunneling over the VPN connection, and returns the secure packets to operating system 64 for output via transmitter 72 via radio signals.
  • VPN handler 68 receives inbound packets from operating system 64 that are associated with the VPN connection, processes the secure packets to extract and reform application-layer data, and passes the application-layer data to user applications 82. In this way, VPN handler 68 may be used as a single point of entry for secure enterprise access from mobile devices and endpoint computing devices alike without requiring separate support for different types of applications.
  • VPN handler 68 maintains the VPN connection even after the VPN control application 80 quits. Thus, VPN control application 80 need not be active to allow other user applications 82 to utilize the tunnel.
  • VPN handler 68 may be configured to automatically tear down the VPN connection in the event mobile device 19 is put to sleep. When mobile device 19 wakes up, VPN handler 68 automatically brings the VPN connection to an active state. In some cases, VPN handler 68 monitors the amount of traffic flow on the VPN connection so as to detect idle VPN connections and automatically disconnect the VPN connection after a user-configurable amount of idle time.
  • VPN handler 68 registers a pre-defined, custom URL format with operating system 64.
  • operating system 64 automatically launches the application that registered the URL format.
  • VPN handler 68 registers a custom URL format with the following form:
  • Security module 84 is a software thread provided by the mult-service client that, when installed, is continuously executed in the background by operation system 64 to provide certain security functions for mobile device 19.
  • security manager 84 may provide anti-virus and spyware detection functions for mobile device, and VPN handler 68 transparently shunts traffic to the security module for application of the security services.
  • VPN control application 80 may provide a user interface for configuring anti-virus settings, personal firewall settings and other parameters associated with of the security module 84.
  • VPN handler 68 registers with security manager 84, and the security manager provides up-to-date security information to the VPN handler. Moreover, VPN handler 68 may locally require active, registered anti-virus and spyware software and up-to-date virus definitions before allowing a VPN connection to be established with VPN gateway 12. This local enforcement may be controlled by policies received from VPN gateway 12 during the login and authentication process.
  • VPN handler 68 incorporate a "host checker" module that inventories a state of mobile device 19, builds a health status report and passes the health status report to VPN gateway 12 at the time of login for processing and determination as to whether mobile device 19 is compliant with corporate policies.
  • VPN handler 86 may collect and forward up-to-date "health information" to VPN gateway 12 at the time establishment of the VPN connection is requested.
  • health information is used herein to generally refer to data that describes a security state of mobile device 19.
  • the health information may describe whether the specific mobile device contains potentially malicious software (e.g.
  • VPN gateway 12 may prevent access or allow limited access based on both the current health information of mobile device 19 and the particular user that is requesting the VPN connection. Further details of such techniques for controlling access based on health information of a mobile device can be found in U.S. Patent Application, 11/236,987, Filed September 28, 2005 , entitled "NETWORK DEFENSE SYSTEM UTILIZING ENDPOINT HEALTH INDICATORS AND USER IDENTITY," the entire contents of which are incorporated herein by reference.
  • VPN handler 68 and VPN control application 80 are configured such that they may be independently upgraded.
  • the user may be able to upgrade both VPN handler 68 and VPN control application 80 via retrieving the latest distribution package 67 from the electronic repository for user applications provided by the manufacturer of mobile device 19.
  • the VPN handler may be programmed so as to automatically upgrade itself upon establishing a connection to a secure VPN gateway 12 in the event a newer version exists for the VPN handler and the secure VPN gateway that has been configured to require that the mobile device has the newest version of the handler.
  • the new version of VPN handler 68 will be downloaded directly from the secure VPN gateway 12 or a server associated with the VPN gateway.
  • VPN control application 80 is programmed such that when the user launches the VPN control application for the first time, the VPN control application prompts the user with a security warning asking if he or she wishes to enable SSL-VPN functionality. This can be a useful security precaution to prevent malicious software from silently installing VPN software without the user's knowledge. If the user declines, VPN control application 80 may display a splash screen until the user quits the application. If the user accepts, the decision is recorded until the device's memory is wiped.
  • FIG. 4B is a block diagram of a second example embodiment of mobile device 19 that operates in accordance with the techniques described herein.
  • mobile device 19 includes a distribution package 77 that provides a multi-service network client having VPN handler 68, VPN control application 80, security manager 84, acceleration service 92, and collaboration services 94.
  • the multi-service network client may be distributed as a single distribution package 77 from a standard "app" deployment mechanism provided by a manufacturer of mobile device 19.
  • distribution package 77 provides an integrated, multi-service VPN client like distribution package 67 of FIG. 4A .
  • similarly numbered components function as described with respect to FIG. 4B .
  • Acceleration service 92 of the multi-service network client provides integrated data acceleration services for mobile device 19 and may utilize a number of different acceleration techniques.
  • VPN control application 80 provides a unified user interface that allows a user to configure both VPN handler 68 and the acceleration service 92.
  • acceleration service 92 may be configured to provide a local, small-footprint content cache.
  • acceleration service 92 may cache content received in response to requests previously issued by VPN control application 80 or user applications 82 and retrieved from enterprise network 16 or, more generally, public data network 21.
  • VPN handler 68 may, for example, intercept HTTP or HTTPS get requests and query acceleration service 92 to determine if the requested network content is cached locally before encapsulating the requests in the VPN tunnel and issuing the request to O/S interface 66 for output to secure VPN gateway 12. If the content is not cached, VPN handler 68 tunnels the request to secure VPN gateway 12 in normal course and, upon receiving a response, updates the local content cache. VPN handler 68 utilizes the content cache to service subsequent requests.
  • acceleration service may be configured to interact with upstream caches provided by the service provider or the enterprise. In this manner, acceleration service 92 may increase the overall efficiency of downloading content from secure VPN gateway 12 or otherwise.
  • acceleration service 92 may be configured to provide a client-side decompression service that operates in conjunction with an upstream acceleration device that provides real-time, continuous pattern recognition and compression of data flows.
  • an upstream acceleration device may employ pattern recognition and an efficient compression algorithm that is capable of detecting and eliminating repeated phrases of variable length to provide continuous acceleration of a data stream.
  • Acceleration service 92 may maintain a phrase dictionary that is synchronized with a phrase dictionary of the upstream device, and may utilize the phrase dictionary to rebuilt compressed data streams from the upstream compression device. In this way, transmission acceleration may be provided all the way to mobile device 19, including over the wireless transmission medium, without requiring standalone downstream wan acceleration devices. Further example details of continuous data compression using synchronized upstream and downstream devices are described in U.S. Patent 6,856,651, Amit P. Singh , entitled “SYSTEM AND METHOD FOR INCREMENTAL AND CONTINUOUS DATA COMPRESSION,” filed May 30, 2001, the entire contents of which are incorporated herein by reference.
  • acceleration service 92 may be configured to provide transparent application-specific protocol optimization to improve transfer efficiencies for mobile device 19.
  • acceleration service 92 may be used with data flows associated between mobile device 19 and the remote enterprise network.
  • acceleration service 92 may operate as a client-side component that leverages server-side wan acceleration services deployed within secure VPN gateway 12 or within other acceleration devices of enterprise network 16.
  • use of acceleration service 92 is not limited to enterprise VPN environments.
  • acceleration service 92 may be used in conjunction with acceleration devices deployed within service provider network 20 for data flows that do not pass through the VPN connection.
  • Collaboration components 94 provide an integrated package of collaborative applications that can be used in conjunction with any VPN connection established by VPN handler 68 or in a non-enterprise environment.
  • collaboration components may provide software for network meetings, secure desktops, document sharing or other software that may aid the user in collaborating with others.
  • FIG. 4C is another block diagram of system 10 ( FIG. 1 ) and shows the multi-service network client described herein deployed to two mobile devices 19A and 19B.
  • each of mobile devices 19A, 19B include distribution package 77 of FIG. 4B , and each have an integrated network client that provides a VPN handler, a VPN control application, a security manager, an acceleration service, and collaboration services.
  • VPN handler 68 executing on mobile device 19B has established VPN connection 95 with secure VPN gateway 112 of enterprise network 16 in accordance with the techniques described herein. Moreover, the VPN handler transparently invokes the integrated acceleration service 92 to provide compression and acceleration services for VPN connection 95. Further, as shown in FIG. 4C , the acceleration service of mobile device 19B operates in concert with upstream acceleration device 98 of enterprise network 16 to provide for pattern recognition for WAN acceleration.
  • mobile device 19A is utilized without an enterprise network and, in particular, without establishing a VPN connection with a remote secure VPN gateway.
  • the VPN handler of the multi-service network client operates as a transparent front-end for distributing packet flows to the acceleration service, security manager, and collaborative services that are integrated within distribution package 77 without providing VPN tunneling services for data flows 96. That is, the VPN handler need not establish a VPN connection nor provide encryption / decryption services to the packet flows, but nevertheless seamlessly applies the other integrated services to data flows 96 between mobile device 19A and public resources 99 accessible via packet data network 21, such as the Internet. For example, as shown in FIG.
  • the VPN handler executing on mobile device 19A still receives and send packets to an O/S interface and, at this time, seamlessly routes the packets through the integrated acceleration service (such as acceleration service 92 of FIG. 4B ) to provide compression and acceleration services for data flows 96.
  • the acceleration service of mobile device 19A operates in concert with upstream acceleration device 97 of service provider network 20 to provide for pattern recognition for WAN acceleration.
  • the acceleration service may provide a content cache, file compression and other services.
  • the VPN client of mobile device 19A integrates with the security manager of the distribution package to provide anti-virus and spyware detection functions for mobile device.
  • the VPN handler of mobile device 19A may locally require active, registered anti-virus and spyware software and up-to-date virus definitions before allowing packets to be communicated to service provider network 20 via data flows 96.
  • a user of a mobile device may deploy and utilize the multi-service network client described herein either as an enterprise solution, as strictly a consumer application without enterprise VPN connectivity, or both.
  • the VPN control application provides a unified user interface and the internal VPN handler may be used to provide a front-end for routing inbound and outbound packets through the other services, such as acceleration and security regardless of whether the VPN handler is configured to establish a VPN connection and tunnel the packets through the VPN connection.
  • the executables associated with the multi-service VPN client may be similar or even identical for the different deployments, with certain functionality disabled for the non-enterprise deployment. This may allow a user to convert the multi-service VPN client from a non-enterprise deployment to an enterprise deployment and full VPN functionality by merely entering a key or authentication code without requiring installation of addition executable software.
  • FIG. 5 is a schematic diagram illustrating a front view of one embodiment of mobile device 19.
  • mobile phone includes a touch screen for presenting an interactive display 100 having a plurality of icons, each corresponding to a different user-launchable application.
  • display 100 includes an icon 102 with which a user interacts to launch VPN control application 80.
  • FIG. 6 illustrates display 110 presented by VPN control application 80 once launched.
  • display 110 is presented in the native format of mobile device 19 and, in the example embodiment, is not a web page.
  • display 110 as a Home window for the user that includes seven icons that provide quick access for the user to common functions, including an icon for accessing the enterprise intranet, an icon for accessing email, an icon for managing the VPN connection, an icon for signing into the enterprise, an icon for setting a current user profile, an icon for viewing related logs and an icon for viewing "About" information for the VPN handler.
  • no current profile has been selected for the user and no VPN session has been created. That is, before they can connect, the user must select a server to which connect.
  • VPN control application 80 When VPN control application 80 is launched for the first time no server will be selected.
  • VPN control application 80 allows the user to define profiles and, for each profile, specify an address for target server or security appliance (e.g., secure VPN gateway 12) for the profile.
  • display 110 includes a status bar 111 and an indicator light 112 that represents the status of whether any VPN connection has been established
  • FIG. 7A illustrates display 120 presented by VPN control application 80 when the user elects to manage and ultimately select a user profile.
  • display 120 lists two profiles (Test Profile, and Corporate Profile) and includes an input mechanism 122 that allows the user to create a new user profile.
  • FIG. 7B illustrates display 125 presented by VPN control application 80 when the user selects input mechanism 122 ( FIG. 7A ) and creates a new user profile.
  • the user is able to enter a profile name and a URL or address associated with the target enterprise.
  • the user may also select a particular digital certificate from a list of certificates installed on mobile device 19.
  • VPN handler 68 uses the selected certificate for user authentication when establishing the VPN connection with secure VPN gateway 12 associated with the specified address or URL.
  • FIG. 8A illustrates display 130 presented by VPN control application 80 after the user has created and selected a user profile, i.e., Acme Gizmo, Inc., for quick VPN access. At this time, the user has not yet signed in and a VPN connection has not yet been established. Display 130 presents a Sign In icon for one-click initiation of the sign-in process.
  • a user profile i.e., Acme Gizmo, Inc.
  • FIG. 8B illustrates display 135 presented by VPN control application 80 after the user has selected the Sign In icon of Home display 110 ( FIG. 6 ) to initiate the sign-in process using the Acme Gizmo, Inc. profile.
  • VPN handler 68 has initiated communication with secure VPN gateway 12 via HTTPS, which returns an HTML-based login page.
  • VPN control application 80 specifies a specific HTTP user agent in the HTTPS request during the login phase to signal to VPN gateway 12 that the requesting device is a mobile device, thereby allowing VPN gateway 12 to select customized web-pages for the device.
  • VPN control application 80 parses data from the returned HTML source code and renders display 135 within the native display of mobile device 19 to present authentication input mechanisms.
  • FIG. 9A illustrates display 137 presented by VPN control application 80 after VPN handler 68 has successfully authenticated the user logged into the enterprise and established the VPN connection with VPN gateway 12.
  • the administrator has defined a plurality of different roles for the user. Moreover, each of the roles may be allow access to a specific set of protected resources 14. To further increase security, the administrator may configure secure VPN gateway 12 to present all or only an identified subset of the user's roles to the user when VPN access is being made through mobile device 19, which may be more readily stolen and compromised versus a home computer.
  • secure VPN gateway 12 may allow the administrator to define certain geographic regions and assign those geographic regions a level of trust.
  • the administrator may specify a required level of trust for a role to be made available to a user over the VPN connection, and the required level of trust can be specified on a per-user basis. From the overall roles for the user, secure VPN gateway 12 constructs a set of roles to be presented to the user by mobile device 19.
  • Secure VPN gateway 12 may determine the set, for example, based on a level of trust assigned by the administrator for the geographic region in which mobile device 19 is currently positioned as well as any user-specific threshold level of trust assigned by the administrator that must be met before a given role is available for the particular user when using a mobile device.
  • the administrator may specify a level of trust of '5' (e.g., full trust) for the United States and '3' (moderate trust) for a second geographic region that the administrator or enterprise policies deems more likely of a security risk.
  • the administrator may assign a required level of '5' to an "administrator role.” As such, those users eligible for the "administrator role” may be presented with such an option when accessing secure VPN gateway 12 within mobile device 19 from within the United States but not when accessing the secure VPN gateway from the second geographic region.
  • FIG. 9B illustrates display 140 presented by VPN control application 80 as the Home after authentication and establishment of the VPN connection with VPN gateway 12.
  • indicator 112 is rendered to show the connectivity state
  • status bar 111 shows the user name and the elapsed connection time.
  • the Sign In icon has been replaced with a Sign Out icon that allows the user to terminate the VPN connection.
  • FIG. 10 illustrates a display 150 presented by VPN control application 80 when the user has selected the Sign Out icon from the Home screen. Once selected, the user is returned to the home screen and prompted for confirmation.
  • FIG. 11 illustrates display 160 presented by VPN control application 80 after the user has selected the VPN icon from Home display 110 ( FIG. 6 ).
  • display 150 presents certain configuration parameters for the establishment of the VPN, such as whether to automatically establish the VPN connection upon authenticating to the enterprise and receiving any session data.
  • VPN handler 68 does not create the VPN connection even though authentication has been completed. Instead, VPN handler 68 waits until application-layer data has been received from either VPN control application 80 or other user applications 82. In this way, fees and charges associated with data transfer over cellular data services may be reduced.
  • the number of open session VPN gateway 12 is required to maintain and service may also be reduced.
  • Display 160 also presents current information associated with the VPN connection, including a current number of bytes sent and a current number of bytes received since the VPN connection was established.
  • display 160 includes a Disconnect button that allows the user to terminate the VPN connection.
  • FIG. 12 illustrates display 170 presented by VPN control application 80 after the user has selected the Intranet icon from display 110 ( FIG. 6 ).
  • display 160 represents a translated version of the user's default home web page in a format that can be rendered by the VPN control application.
  • VPN control application 80 presents display 170 rather than the display being presented as a web page through a web browser installed on mobile device 19.
  • VPN control application 80 issues an HTTPS get request to retrieve the user's bookmark web page ( FIG. 3 ) that would normally be presented as a full web page to the user if the user where accessing VPN gateway 12 via an endpoint computing device 18.
  • VPN control application 80 dynamically parses links and other bookmark information from the HTTPS response from secure VPN gateway 12 when accessing the home web page and dynamically builds a window for display 160 on mobile device 19.
  • display 170 is built and presented as a display as part of VPN control application 80 and not as a web page of a separate web browser installed on mobile device 19. That is, VPN control application 80 dynamically constructs display 160 to include input controls that are native application controls provided by mobile device 19, where each of the input controls corresponds to a different bookmark parsed from the HTML response received from VPN gateway 12.
  • VPN control application 80 has dynamically constructed display 160 to include a set of input controls 162 for the user-defined bookmarks and a second set of input controls 164 that correspond to the administrator-defined bookmarks of the user's default home web page ( FIG. 3 ).
  • Each of the bookmarks is represented by an input button graphic that is supported by the native display of mobile device 19.
  • VPN control application 80 formulates and outputs an appropriate HTTP string as if a corresponding HTML link were selected by the user.
  • bookmarks 162, 164 are not web-based URLs as normally embedded in web pages, but operate as buttons on mobile device 19 and serve the purpose of pseudo-links within the context of the enterprise VPN.
  • Example links that can be translated and rendered on mobile device 19 include links to local file servers, a link to an intranet file server, a link for a pre-configured remote desktop terminal session for the user that may run over the VPN connection.
  • VPN control application 80 includes an internal HMTL parser and extraction of bookmark information is performed in real-time using combination of XPath queries on the HTML and processing logic on the set of elements returned by the XPath query. Further details on the XML Path Language (XPath) can be found in "XML Path Language (XPath)", Version 1.0, available from World Wide Web Consortium (W3C), November 16, 1999, the entire content of which is incorporate herein by reference.
  • W3C World Wide Web Consortium
  • VPN control application 80 retrieves the bookmark web page by issuing a direct request for an index.cgi file for the particular VPN user.
  • VPN control application 80 parses the response from VPN gateway 12 with its internal HTML parser using the following search algorithm to extract the bookmarks' URLs and titles.
  • VPN control application 80 issues XPath queries to locate all anchor elements with href attributes which contain "launch.cgi.” In one example, this is achieved by the following XPath query: //a [contains(@href, launch.cgi')].
  • VPN control application 80 iterates over all children and extracts bookmark captions from the elements with simple string content.
  • VPN control application 80 extracts the actual URL of each bookmark from the anchor href attribute. VPN control application 80 eliminates any duplicates which can occur due to icon links in the HTML.
  • VPN control application 80 locates the corresponding description by getting all sibling elements of that anchor and finding the one which has simple string content. In the HTML example snippet given, this would be the ⁇ span> element with a content of "Sample Bookmark description".
  • VPN control application 80 is able to distinguish custom bookmarks based on the presence of the additional link for editing them. These links can be found enumerating the anchor items which have editbk.cgi in their href attribute. This can be done with the following XPath query: //a[contains(@href, 'editbk.cgi')]
  • bookmarks For example, the following links may be extracted as bookmarks:
  • the VPN control application When a user selects a bookmark from the native UI displayed by VPN control application 80, the VPN control application opened it is opened in an embedded browser control that is hidden from the user. The browser is navigated directly to the URL extracted for the given bookmark and may be presented to the user as a web page via a browser or may dynamically processed into the native display of mobile device 19.
  • VPN control application 80 looks for a specially configured bookmark with the following example name: "Mobile Webmail.” If such a bookmark exists, the Email icon ( FIG. 6 ) will launch a web-based email in a browser, opening the Mobile Webmail bookmark link.
  • VPN handler 68 may launch a native email application provided by mobile device 19.
  • VPN control application 80 allows an administrator to define a custom page to be displayed instead of the standard bookmarks page.
  • VPN control application 80 detects whether the bookmarks page has been returned by VPN gateway 12 or not. If a custom page is being opened as part of the standard flow, then VPN control application 80 displays this custom page in place dynamically constructing the native user interface for bookmarks.
  • FIG. 13 illustrates display 170 presented by VPN control application 80 after the user has toggled from the bookmark view ( FIG. 12 ) to a view of a history of previously selected pseudo-links.
  • FIG. 14 illustrates display 185 presented by VPN control application 80 after the user has selected the LOGS icon from display 110 ( FIG. 6 ). As shown, display 185 presents a transaction window 187 for listing activity related to the VPN connection including date and time stamps for each action.
  • VPN control application 80 may also provide input mechanisms that allow the user to upload the log to secure VPN gateway 12 or automatically attaching them to email for emailing them to an administrative email address specified by secure VPN gateway 12. This may provide an easy and efficient mechanism by which the user can obtain assistance with setting up the VPN connection on his or her mobile device 19.
  • VPN handler 68 may utilize a form of compression when communicating with VPN gateway 12 over the VPN tunnel. That is, VPN handler 68 may compress the application-layer data within the carried by the payloads of the tunneled packets. After compressing the data, VPN handler 68 encrypts and encapsulates the data to form secure packets for tunneling to VPN gateway 12. This allows VPN handler 68 to reduce the amount of bandwidth consumed by the VPN connection, which may be important in a mobile environment.
  • VPN handler 68 includes algorithms for applying Lempel-Ziv (LZ) compression in conjunction with an IPSEC connection to tunnel encrypted IP packets, i.e., Encapsulation Security Payload (ESP) packets, on top of a connection-less protocol, e.g., IP or User Datagram Protocol (UDP), to VPN gateway 12.
  • LZ Lempel-Ziv
  • ESP Encapsulation Security Payload
  • UDP User Datagram Protocol
  • VPN handler 68 supports both SSL and IPSec protocols is programmed to intelligently and dynamically switch between the two depending upon the state of the VPN connection to VPN gateway 12.
  • VPN handler 68 handles interaction and authentication to VPN gateway 12, establishment and deconstructing of a secure data connection conforming to a security scheme, such as SSL or IPSec protocols, and the formation of outbound packets to be tunneled and the processing of inbound packets received from the tunnel.
  • a security scheme such as SSL or IPSec protocols
  • VPN handler 68 may establish an IPSec VPN may be established to tunnel encrypted IP packets on top of a connection-less protocol, e.g., IP or User Datagram Protocol (UDP).
  • VPN handler 68 may use and SSL VPN to tunnel IP packets on top of a Layer 4 connection-oriented protocol, e.g., Transmission Control Protocol (TCP).
  • TCP Transmission Control Protocol
  • VPN handler 68 recognizes that TCP inherently introduces latency with SSL VPN tunnel relative to IP SEC over UDP, yet in some cases may provide connectivity through firewalls that typically recognize SSL packets but block UDP packets. For this reason, VPN handler 68 may be programmed to adaptively failover between an L3-based IPSEC network tunnel using UDP as a transport protocol and an L4-based SSL network tunnel that uses TCP as a transport.
  • VPN handler 68 may first establish the VPN connection ton include an SSL VPN tunnel by performing a key exchange with secure VPN gateway 12.
  • VPN handler 68 may encapsulate initial application-layer data within a SSL encrypted packet stream flowing on through the SSL VPN tunnel between the mobile device 19 and the secure VPN gateway 12.
  • an SSL VPN tunnel can operate in most remote network environments including firewalls and proxies, tunneling packets on top of the connection oriented TCP inherently introduces latency, complexity and potentially increased bandwidth, all of which may be of significant concern in a mobile environment. Therefore, VPN handler 68 may also establish a parallel IPSec VPN tunnel with secure VPN gateway 12 for the VPN connection while simultaneously sending the any initial data packets on SSL VPN tunnel.
  • VPN handler 68 may send test messages, i.e., discovery packets, over the IPSEC VPN tunnel in parallel with sending data over the SSL VPN tunnel. If VPN handler 68 receives a reply to the test messages on IPSec VPN tunnel 62, VPN handler 68 stops sending data on the SSL VPN tunnel and instead automatically (e.g., without manual intervention) utilizes to IPSec VPN tunnel. At this point, VPN handler 68 may tear down the SSL VPN tunnel or, in many cases, may leave the SSL connection established. In this way, if the remote network environment changes and the data packets can no longer reach the corporate network on the IPSec VPN tunnel, VPN handler 68 automatically (e.g., without manual intervention) returns to the SSL VPN tunnel.
  • test messages i.e., discovery packets
  • VPN handler 68 may use a single IP address assigned to mobile device 19 by secure VPN gateway 12 for the VPN for both of the tunnels and effectively dynamically change the type of transport layer protocol (e.g., TCP or UDP) of the operating system and the security service (e.g., IP SEC and SSL) applied to tunneled packets.
  • VPN handler 68 and secure VPN gateway 12 may operate in accordance with the techniques set forth in U.S. Patent Application 11/226,501, filed September 14, 2005 , entitled "ADAPTIVE FAILOVER BETWEEN LAYER THREE AND LAYER FOUR NETWORK TUNNELS," the entire contents of which are incorporated herein by reference.
  • the adaptive transition between SSL and IPSEC VPN connections by VPN handler 68 may be particularly advantageous in mobile device 19 because, in some cases, operating system 64 may already be using UDP ports associated with IP SEC.
  • an IPSEC VPN connection by a higher-level VPN handler 68 e.g., a VPN handler executing in kernel mode
  • VPN handler 68 may establish the VPN connection and initially utilize SSL and automatically transition from an SSL tunnel with TCP transport (e.g., an L4 tunnel) to the an IPSEC tunnel with UDP transport (e.g., an L3 tunnel) without terminating the VPN connection only when the UDP network ports associated with the L3 tunnel are unblocked by the operating system.
  • TCP transport e.g., an L4 tunnel
  • UDP transport e.g., an L3 tunnel
  • VPN handler 68 performs a fast reconnect in the event communication with secure VPN gateway 12 is temporarily lost. More specifically, establishes an SSL control channel by issuing an HTTPS request to secure VPN gateway 12. Upon a successful authentication, secure VPN gateway 12 provides a session cookie with a unique identifier that the secure VPN gateway maps to specific user information. This allows VPN handler 68 in the event the VPN connection is temporarily lost. This may be especially important on mobile devices due to constantly changing network conditions such as transition between base stations, switching between a wireless local area network (“WiFi”) and cellular packet-based network connections, and power state transitions. In the event the status of the network connection has changed by mobile device 19, O/S interface 66 may set a semaphore or other signaling mechanism to signal the change.
  • WiFi wireless local area network
  • VPN handler 68 issues another HTTPS request and includes the session cookie, which allows the VPN handler to re-establish the VPN connection with secure VPN gateway 12 without requiring the user repeat the typical authentication process.
  • VPN handler 68 determines which type of transport mechanism is available, WiFi or cellular, to mobile device 19. In the event only a cellular packet-based network connection is available and not the WiFi connection, VPN handler 68 may selectively defer fast reconnect even though a valid, unexpired session cookie exists on mobile device 19. In particular, VPN handler 68 may defer fast reconnect until application-layer data is received from user applications 82.
  • VPN handler 68 defers fast VPN reconnect until receiving another event from O/S interface 66 indicating that network traffic is pending or has been initiated by user applications 82. In this way, VPN handler 68 may potentially reduce user fees associated with minutes or bandwidth consumption for data services that may arise with an established yet idle VPN connection.
  • FIG. 15 is an example user interface 190 presented by secure VPN gateway 12 by which an administrator is able to provide a variety of configuration parameters for administering secure access to endpoint computing devices 18 and cellular mobile devices 19.
  • user interface 190 allows the administrator to enter configuration data with respect to endpoint compliance functions and host checker functions
  • user interface 190 includes a check box input control 192 by which an administrator is able to specify a host checker requirement related to security manager 84. That is, the administrator is able to specify that a pre-requisite to authorizing secure access to the enterprise is that the health status report generated by the integrated host checker functions of the multi-service client for the mobile device 19 must indicate that anti-virus and spyware software for security manager 84 are registered, enabled and up-to-date.
  • secure VPN gateway may deny access or provide quarantined access to limited resources required to download any out-of-date security component to mobile device 19.
  • processors including one or more microprocessors, digital signal processors (DSPs), application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), or any other equivalent integrated or discrete logic circuitry, as well as any combinations of such components.
  • DSPs digital signal processors
  • ASICs application specific integrated circuits
  • FPGAs field programmable gate arrays
  • processors may generally refer to any of the foregoing logic circuitry, alone or in combination with other logic circuitry, or any other equivalent circuitry.
  • a control unit comprising hardware may also perform one or more of the techniques of this disclosure.
  • Such hardware, software, and firmware may be implemented within the same device or within separate devices to support the various operations and functions described in this disclosure.
  • any of the described units, modules or components may be implemented together or separately as discrete but interoperable logic devices. Depiction of different features as modules or units is intended to highlight different functional aspects and does not necessarily imply that such modules or units must be realized by separate hardware or software components. Rather, functionality associated with one or more modules or units may be performed by separate hardware or software components, or integrated within common or separate hardware or software components.
  • Computer readable storage media may include random access memory (RAM), read only memory (ROM), programmable read only memory (PROM), erasable programmable read only memory (EPROM), electronically erasable programmable read only memory (EEPROM), flash memory, a hard disk, a CD-ROM, a floppy disk, a cassette, magnetic media, optical media, or other computer-readable storage media.
  • RAM random access memory
  • ROM read only memory
  • PROM programmable read only memory
  • EPROM erasable programmable read only memory
  • EEPROM electronically erasable programmable read only memory
  • flash memory a hard disk, a CD-ROM, a floppy disk, a cassette, magnetic media, optical media, or other computer-readable storage media.
  • the device may comprise a transmitter and receiver to send and receive cellular communications in the form of radio frequency signals, a microprocessor, an operating system executing on the microprocessor to provide an operating environment of application software, and a multi-service network client registered with the operating system as a single application.
  • the multi-service network client comprises a virtual private network (VPN) handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device.
  • VPN virtual private network
  • the network client may include a security manager to receive the decrypted inbound network packets from the VPN handler and apply at least one security service to the decrypted network packets, and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the security manager.
  • the multi-service network client may be deployed from a single downloadable distribution package.
  • the VPN control application may present a unified user interface for configuring anti-virus settings and personal firewall settings of the security manager.
  • the security manager may apply anti-virus and spyware services to the network packets and provide an interface by which the VPN handler determines whether a user of the cellular mobile device has activated and registered the security manager.
  • the VPN handler may require an affirmative indication from the security manager prior to establishing the VPN connection with the VPN gateway.
  • the VPN handler may comprise a host checker module that inventories a state of the cellular mobile device and builds a health status report, and the host checker may output the health status report to the VPN gateway prior to establishing the VPN connection for determining whether the cellular mobile device is compliant with corporate policies.
  • the multi-service network client may further comprise a data acceleration module that applies at least one acceleration service to the network packets from the VPN handler.
  • the data acceleration module may provide a local content cache, a client-side decompression service that operates in conjunction with an upstream acceleration device to provide real-time, continuous pattern recognition and compression of data flows within the network packets, and/or application-specific protocol optimization for control flows within the network packets.
  • the multi-service network client may further comprise one or more collaboration components that process the packets from the VPN handler, wherein collaboration components provide collaboration services including at least one of a network meeting, a secure desktop or a document sharing service.
  • the VPN control application may provide a user interface that allows a user to disable VPN connectivity, and, when VPN connectivity is disabled, the VPN handler may exchange the network packets with the operating system and transparently provides the packets to the security manager for application of the security service.
  • the user interface of the VPN control applications allows the user to submit credentials and instruct the VPN handler to dynamically instantiate the secure VPN connection or deconstruct an existing VPN connection.
  • the VPN control application may receive a web-based home page from the secure VPN device via an Hypertext Transfer Protocol Secure (HTTPS) response.
  • HTTPS Hypertext Transfer Protocol Secure
  • the secure VPN connection dynamically parses HyperText Markup Language (HTML) bookmark links from the HTTPS response and renders a bookmark window using input controls native to the cellular mobile device, where each of the input controls corresponds to a different one of the bookmarks parsed from the HTML response received from the secure VPN gateway, and, upon selection of one of the input controls, the VPN control application may formulate and output an appropriate HTTP string to the secure VPN device as if a corresponding HTML link were selected by the user.
  • HTML HyperText Markup Language
  • the VPN control application may detect within the HTTPS response one of the bookmarks that provides a link to a webmail for the user, and, upon detecting the bookmark for the webmail, the VPN control application dynamically constructs the user interface to have an input control for launching a native email client of the cellular mobile device to access the email without launching a web browser.
  • the VPN handler and the VPN control application may be configured to be independently upgradable.
  • the VPN handler may establishe the VPN connection as an Internet Protocol Security (IPSec) connection over User Datagram Protocol (UDP), and the VPN handler may include a compression module that applies Lempel-Ziv (LZ) compression in conjunction with the IPSec connection to tunnel encrypted IP packets to the secure VPN gateway.
  • IPSec Internet Protocol Security
  • UDP User Datagram Protocol
  • LZ LZ
  • the VPN handler establishes an Secure Socket Layer (SSL) control channel with the secure VPN gateway and, upon a successful authentication, receives a session cookie with a unique identifier.
  • SSL Secure Socket Layer
  • the VPN handler may perform a fast reconnect by issuing the session cookie to the secure VPN gateway.
  • the VPN handler may identify a set of transport mechanisms currently available to the cellular mobile device and, when only a cellular network is available and not a wireless packet-based connection, the VPN handler may defer the fast reconnect until application-layer data is received from a user application and ready to be sent via the VPN connection.
  • a cellular mobile device comprising: a transmitter and receiver to send and receive cellular communications in the form of radio frequency signals; a microprocessor; an operating system executing on the microprocessor to provide an operating environment of application software; a multi-service virtual private network (VPN) client registered with the operating system as a single application, wherein the multi-service network client comprises: a VPN handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device; a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets; and a VPN control application that provides a unified user interface that allows a user to configure the VPN handler and the data acceleration module.
  • VPN virtual private network
  • a system comprising: a virtual private network (VPN) security device coupled to a packet network; a cellular mobile device comprising a microprocessor, an operating system executing on the microprocessor to provide an operating environment of application software, and a multi-service network client registered with the operating system as a single application, wherein the multi-service network client comprises: a VPN handler to exchange network packets with the operating system, wherein the VPN handler establishes a VPN connection with a remote VPN security device of an enterprise and processes to network packets for tunneling between the cellular mobile device and the remote VPN security device; and a security manager to receive the network packets from the VPN handler and apply at least one security service to the network packets, a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the security manager, wherein the secure VPN device presents an interface by which an administrator defines a plurality of different roles for the user, wherein upon authenticating the user, the secure VPN device selects a subset of the roles
  • a method comprising: receiving, with a cellular mobile device from an electronic repository, a single distribution software package that includes a multi-service network client, wherein the multi-service network client includes a virtual private network (VPN) handler, a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets, and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the security manager; and installing the multi-service network client on the cellular mobile device including registering the VPN handler with an operating system of the cellular mobile device, wherein the VPN handler provides a single point of entry for network packets from the operating system to apply VPN services with the VPN handler and security services with the security manager.
  • VPN virtual private network
  • a program product comprising software program code to execute a multi-service network client on a processor within a cellular device
  • the multi-service network client comprises: a virtual private network (VPN) handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device; a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets; and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the data acceleration module.
  • the program product can comprise a non-transitory computer-readable medium storing a downloadable distribution package comprising the computer program code.

Abstract

An integrated, multi-service virtual private network (VPN) network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise VPN connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services. The multi-service client integrates with an operating system of the device to provide a VPN handler to establish a VPN connection with a remote VPN security device. The VPN network client includes to data acceleration module exchange network packets with the VPN handler and apply at least one acceleration service to the network packets, and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the data acceleration module.

Description

  • This application claims the benefit of U.S. Provisional Patent Application 61/398,758 filed June 30, 2010 and U.S. Patent Application 12/968,015 filed December 14,2010 , the entire content of each of which is incorporated herein by reference.
  • TECHNICAL FIELD
  • The invention relates to cellular networks and, more particularly, to cellular-based network data services.
  • BACKGROUND
  • Use of cellular mobile devices for accessing computer data networks has recently increased dramatically. These mobile devices, often referred to as "smart" phones, provide a platform for both cellular phone calls and cellular-based access to computer data services. For example, a typical cellular radio access network is a collection of cells that each include base stations capable of transmitting and relaying radio signals to subscribers' mobile devices. A "cell" generally denotes a distinct area of a cellular network that utilizes a particular frequency or range of frequencies for transmission of data. A typical base station is a tower to which are affixed a number of antennas that transmit and receive the data over the particular frequency. Mobile devices may transmit radio signals at the designated frequency to the base stations to initiate cellular telephone calls or packet-based data services.
  • With respect to data services, cellular service providers convert the cellular signals, e.g., Time Division Multiple Access (TDMA) signals, Orthogonal Frequency-Division Multiplexing (OFDM) signals or Code Division Multiple Access (CDMA) signals, received from mobile devices at the base stations into Internet protocol (IP) packets for transmission within packet-based networks.
  • The ubiquitous use of cellular mobile devices and the ever increasing desire by users for fast, secure network access from around the world has presented many challenges for enterprises. Enabling even basic connectivity across all desired cellular mobile device platforms can be a huge challenge. Enabling secure connectivity with an easy end-user experience can be even more challenging. For example, the dramatic increase in use of cellular mobile devices for computer data services has exposed service providers and enterprise networks to increased security risks presented by misconfigured devices. Because users often lack technical experience, endpoint devices, including cellular mobile devices, often become misconfigured. That is, users may accidentally install viruses, spyware, or other software that can potentially damage the functionality of the endpoint device or compromise the security of the computer network to which the endpoint is coupled. Once affected, endpoint devices can inadvertently spread malicious software to the servers and possibly to other endpoint devices. As numerous different endpoint security and connectivity software applications are added to each end user mobile device, the potential for problems and network conflicts increases. It is currently very difficult for information technology (IT) staff to enable network connectivity for users from any device, at any time, from virtually anywhere, without requiring significant end-user interaction with complex technologies.
  • SUMMARY
  • In general, an integrated, multi-service network client for cellular mobile devices is described. For example, techniques are described by which a single software package can be easily deployed on mobile network devices to provide integrated secure enterprise virtual private network (VPN) connectivity, network acceleration, security management including monitored and enforced endpoint compliance, and collaboration services. The integrated, multi-service client may be deployed as a single package downloadable from a standard application ("app") deployment mechanism, such as an electronic store or other repository for user applications, provided by a manufacturer of a mobile device.
  • Once installed on the cellular mobile device, the multi-service client integrates with an operating system of the device so as to provide a single entry point for user authentication for secure enterprise connectivity, endpoint security services including endpoint compliance with respect to anti-virus and spyware software, acceleration, and comprehensive integrity checks. The multi-service client provides a common user interface to the integrated services, and provides a VPN handler that operates as the entry point for network traffic to which the integrated services are to be applied. The multi-service client allows enterprise and service provider IT staff to reduce the number of software agents required and installed on employee devices, thus minimizing potential software conflicts and reducing deployment costs. Further, if additional software, add-ons, or other capabilities are required for a connection, the multi-service network client may automatically download and installs those components without any end user or administrator interaction.
  • In this way, the multi-service network client described herein may integrate several services into one, comprehensive, multi-service client, thus simplifying maintenance, administration, and deployment of network clients. Enterprises may no longer have to deal with separately managed and administered agents. Moreover, the techniques may simplify end user experience and reduce help desk time and administrative expense.
  • In one embodiment, a cellular mobile device comprises a transmitter and receiver to send and receive cellular communications in the form of radio frequency signals, a microprocessor, and an operating system executing on the microprocessor to provide an operating environment of application software. The cellular mobile device further comprises a multi-service client registered with the operating system as a single application. The multi-service network client comprises a VPN handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device. The multi-service network client further includes a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets, and a VPN control application that provides a unified user interface that allows a user to configure the VPN handler and the data acceleration module.
  • In another aspect, a non-transitory computer-readable medium stores a downloadable distribution package comprising software program code to execute a multi-service network client on a processor within a cellular device. The multi-service network client comprises a virtual private network (VPN) handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device. The multi-service network client further includes a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets, and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the data acceleration module.
  • The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram illustrating an example system in which a secure VPN gateway of an enterprise provides secure access to protected resources of an enterprise network for both endpoint computing devices and cellular mobile devices.
  • FIG. 2 shows an example login web page presented to the user via the web browser when accessing the secure VPN gateway via an endpoint computing device.
  • FIG. 3 shows an example user home web page presented to the user via the web browser when accessing the secure VPN gateway via an endpoint computing device.
  • FIG. 4A is a block diagram of an example embodiment of a cellular mobile device having a multi-service network client in accordance with the techniques described herein.
  • FIG. 4B is a block diagram of a second example embodiment of a cellular mobile device a multi-service network client in accordance with the techniques described herein.
  • FIG. 4C is another block diagram of the computing system of FIG. 1 and shows the example mobile devices utilizing multi-service network client for both enterprise connectivity and non-enterprise connectivity.
  • FIGS. 5-14 are schematic diagrams illustrating a front view of one embodiment of a cellular mobile device and show a number of displays presented by the multi-service network client deployed on the cellular mobile device.
  • FIG. 15 is an example user interface 190 presented by secure VPN gateway.
  • DETAILED DESCRIPTION
  • FIG. 1 is a block diagram illustrating an example system 10 in which secure VPN gateway 12 provides secure access to protected resources 14 of enterprise network 16. That is, secure VPN gateway 12 enables secure and controlled access to resources provided by enterprise network 16. For example, endpoint computing devices ("ECDs") 18A-18M and cellular mobile devices 19A-18N remotely access enterprise network 16 via service provider network 20 and an intermediate packet data network 21, such as the Internet.
  • In one example, secure VPN gateway 12 is a secure sockets layer VPN (SSL VPN) device that provides VPN services to clients. Further details on SSL VPN appliances and operations are found in "Juniper Networks Secure Access Administration Guide, Release 6.5," Juniper Networks, Inc., 2008, which is incorporated herein by reference in its entirety. Secure VPN gateway 12 may be a standalone appliance or may be hosted on one or more other devices, such as an intrusion detection and prevention (IDP) system, a firewall, a unified threat management (UTM) device, a router, or other network device.
  • Enterprise network 16 provides access to sensitive data and services that are accessible only to certain authorized users of the enterprise. The users may access enterprise network 16 by authentication to secure VPN gateway 12 and establishing a communication channel through service provider network 20. In this way, enterprise administrators may use secure VPN gateway 12 to discriminate access to enterprise network 16 by individual employees based on employee authorization. In this way, system 10 enables remote access to protected resources 14 of enterprise network 16. Each of protected resources 14 may be, for instance, a web server, an application server, a database server, a file server, an application, an employee workstation, a native messaging or email client, or other electronic resource.
  • In this example, endpoint computing devices 18 may be personal computers, laptop computers or other type of computing device associated with individual employees or other authorized users. In contrast, cellular mobile devices 19 provide a platform for both cellular phone calls and cellular-based access to computer data services. That is, each of mobile devices 19 is a wireless communication device capable of cellular communications. Mobile devices 19 may comprise, for example, a mobile telephone, a laptop or desktop computer having, e.g., a 3G wireless card, a wireless-capable netbook, a video game device, a pager, a smart phone, or a personal data assistant (PDA). Each of mobile devices 19 may run one or more applications, such as mobile calls, video games, videoconferencing, and email, among others.
  • Service provider network 20 also provides network access, data transport and other services to mobile devices 19. Service provider network 20 includes radio access network 25 in which one or more base stations communicate via radio signals with mobile devices 19. Backhaul network ("BN") 27 is a transport network that enables base stations of radio access network to exchange packetized data with mobile core network 31 of the service provider, ultimately for communication with broadband network 29 and packet data network 21. Backhaul network 27 typically comprises communication nodes interconnected by communication links, such as leased land-lines or point-to-point microwave connection. The communication nodes comprise network, aggregation, and switching elements that execute one or more protocols to route packets between base stations and gateway device ("GW") 28 of mobile core network 31. In various aspects, backhaul network 27 may comprise a GSM radio access network (GRAN) or a Universal Mobile Telephony Service (UMTS) terrestrial radio access network (UTRAN) operating according to respective radio access network standards set forth by the relevant standards-setting body (e.g., 3 GPP).
  • Mobile core network 31 provides session management, mobility management, and transport services between backhaul network 27 and broadband network 29 to support access, by mobile devices 19, to packet data network 21 and services of protected resources 14. Mobile core network 31may comprise, for instance, a general packet radio service (GPRS) core packed-switched network, a GPRS core circuit-switched network, an IP-based mobile multimedia core network, or another type of transport network. Mobile core network 7 comprises one or more packet processing nodes to support firewall, load balancing, billing, deep-packet inspection (DPI), and other services for mobile traffic traversing the mobile core network.
  • In the example of FIG. 1, endpoint computing devices 18 connect to network access device 36 via network switch 38. In one embodiment, network switch 38 may comprise digital subscriber line access multiplexers (DSLAMs) or other switching device. Each of endpoint computing devices 18 may utilize a Point-to-Point Protocol (PPP), such as PPP over ATM or PPP over Ethernet (PPPoE), to communicate with network switch 38. For example, using PPP, one of endpoint computing devices 18 may request access to broadband network 29 and provide login information, such as a username and password, for authentication by authentication device ("AD") 30. PPP may be supported on lines such as digital subscriber lines (DSLs) that connect endpoint computing devices 18 with network switch 38. In other embodiments, endpoint computing devices 18 may utilize a non-PPP protocol to communicate with network switch 38. Other embodiments may use other lines besides DSL lines, such as Ethernet over a T1, T3 or other access link.
  • Network switch 38 may communicate with network access device 36 over a physical interface supporting various protocols, e.g., ATM interface supporting ATM protocols. Network access device 36 typically includes Broadband Remote Access Server (BRAS) functionality to aggregate output from switches into a higher-speed uplink to broadband network 29. In some embodiments, network access device 36 may comprise a router that maintains routing information between endpoint computing devices 18 and broadband network 29.
  • Secure VPN gateway 12 intermediates access by endpoint computing devices 18 and mobile devices 19 to protected resources 14. In one example, secure VPN gateway 12 terminates incoming access requests and connections at the application layer of the Open System Interconnection (OSI) reference model or of the TCP/IP model. In this example, secure VPN gateway 12 operates as an application-layer proxy to protect protected resources 14 from direct exposure to packet data network 21. Secure VPN gateway 12 receives incoming access requests encapsulated in a packet, decapsulates the access requests to reach the underlying application data, and sends the application data comprising the access requests to requested protected resources 14.
  • In another example, secure VPN gateway 12 allows direct connections between layers of the OSI reference model or of the TCP/IP model. In this example, secure VPN gateway 12 exchanges data using a secure channel negotiated with the requesting one of endpoint computing devices 18 or mobile devices 19. Secure VPN gateway 12 receives a secure request via the secure channel and makes requests to the appropriate one of protected resources 14 on behalf of the requesting client to establish a data connection between the requesting device and the requested protected resource 14.
  • To access protected resources 14 within enterprise network 16, an endpoint computing device 18 or a mobile device 19 establishes a data connection to secure VPN gateway 12. Each of the data connections may comprise, for example, a secure data connection conforming to a security scheme, such as Secure Sockets Layer (SSL) or Internet Protocol Security (IPSec) protocols. That is, an SSL VPN may be used to tunnel IP packets on top of a Layer 4 connection oriented protocol, e.g., Transmission Control Protocol (TCP). Alternatively, an IPSec VPN may be established to tunnel encrypted IP packets, i.e., Encapsulation Security Payload (ESP) packets, on top of a connection-less protocol, e.g., IP or User Datagram Protocol (UDP).
  • ln either case, secure VPN gateway 12 may require user credentials to establish authentication and authorization. Credentials may include, for example, a username-password pair, a biometric identifier, a data stored on a smart card, a one-time password token or a digital certificate. Based on the provided credentials, secure VPN gateway 12 authorizes or denies access to enterprise network 16. Secure VPN gateway 12 may use an authentication, authorization and accounting (AAA) server to authenticate the credentials. The AAA server may execute on secure VPN gateway 12 or on a separate network device and may be, for example, a Remote Authentication Dial-In User Service (RADIUS) server. Secure VPN gateway 12 and the remote device may also negotiate other aspects of data connection 14 that ensure security, including the type/version of an encryption algorithm, and symmetric keys for encrypting/decryption data transported via data connection 14.
  • When accessing enterprise network 16, a user associated with one of endpoint computing devices 18 may direct a web browser executing on the endpoint computing device to an address Uniform Resource Locator (URL) associated with the enterprise. In this case, secure VPN gateway 12 presents a web page on the endpoint computing device via the web browser to capture the credentials required from the user.
  • FIG. 2 shows an example login web page presented to the user via the web browser when accessing secure VPN gateway 12 via an endpoint computing device 18. Upon proper authentication, secure VPN gateway 12 presents a default user home web page on the endpoint computing device via the web browser.
  • FIG. 3 shows an example user home web page presented to the user via the web browser when accessing secure VPN gateway 12 via an endpoint computing device 18. As shown in FIG. 3, the web page presents a list of bookmarks that allow the user to easily navigate protected resources 14 using HTTP links. In this example, FIG. 3 shows a first link 42 to an intranet file server provided by the enterprise and a second link 44 to enterprise web mail for the user.
  • As described herein, cellular mobile devices 19 each include a multi-service network client that, among other services, allows secure VPN connection to easily be provisioned and established over radio access network 25 of service provider network 20. Other applications running on mobile devices 19 may utilize the VPN connections to access services offered by protected resources 14. That is, cellular mobile devices 19 and secure VPN gateway 12 provide secure VPN services to applications running on the mobile device. In one example, each mobile device 19 includes a secure access application that provides integrated, anytime/anywhere connectivity, acceleration, and security in a manner that simplifies user experience. For example, upon downloading the secure access application, users of mobile devices 19 may no longer need to interact with network access and security software. From any location, users simply supply their credentials and the secure access application interacts with secure VPN gateway 12 to handle all provisioning and deployment. As such, the secure access software on mobile devices 19 enables fast, easy, secure access to corporate networked and cloud-based data and applications from mobile devices and smart phones. Enterprises and service providers can deploy granular role and device-based security policies when provisioning mobile handset access. In one example, the secure access software on mobile devices 19 provides a single, unified client for VPN remote access, WAN acceleration, and endpoint compliance. The secure access software may eliminate the expense and administrative burden of deploying, configuring, and maintaining separate clients. In some cases, the secure access software on mobile devices 19 may use location-aware intelligent session migration to deliver accelerated, secure, anytime/anywhere network and application access automatically. For example, the software may seamlessly migrate from one access method to another based on the user's location, and accelerates secure access to network resources based on user identity and role.
  • FIG. 4A is a block diagram of an example embodiment of mobile device 19 that operates in accordance with the techniques described herein. In this example, mobile device 19 includes a hardware 62 that provides core functionality for operation of the device. Hardware 62 may include one or more programmable microprocessors 70 configured to operate according to executable instructions (i.e., program code), typically stored in a computer-readable medium such as static, random-access memory (SRAM) device or Flash memory device. Transmitter 72 and receiver 74 communicate with other communication devices via a wireless communication, such as high-frequency radio frequency (RF) signals. Hardware 62 may include additional discrete digital logic or analog circuitry.
  • Operating system 64 executes on microprocessor 70 and provides an operating environment for one or more applications (commonly referred to "apps"). O/S interface 66 proves an interface layer of software capable of making kernel calls into operating system 64. In other words, O/S interface 66 provides a framework within which VPN handler 68 operates and may, for example, allow VPN handler 68 to execute within a "user" space of the operating environment provided by mobile device 19. O/S interface 66 may allow other forms of protocol handlers to be "plugged in" for interfacing with operating system 64. O/S interface 66 interacts with operating system 64 to provide OS-level support for protocol-specific handlers. O/S interface 66 may, for example, provide access to lower levels of the OSI stack for routing packets to and from the VPN connection, ensuring DNS resolvers are set correctly for the VPN, and the like. As shown in FIG. 4A, O/S interface 66 routes inbound low-level packets and outbound application-layer communications to VPN handler 68 for processing. At this time, VPN handler 68 registers with operating system 64 to provides a single point of entry for network traffic so as to transparently apply VPN services and security services without requiring registration of multiple agents with operating system 64 or separate administration of those agents.
  • In some cases, executable code for VPN handler 68, VPN control application 80 and security manager 84 may be distributed as a single distribution package 67 that is downloadable from a standard "app" deployment mechanism, such as provided by a server associated with an electronic store or other repository for user applications, provided by a manufacturer of mobile device 19. That is, VPN handler 68, VPN control application 80 and security manager 84 may be integrated into a multi-service client for mobile device 19 to allow easy deployment. An application management utility on the cellular mobile device may, for example, issue a request to the server and, in response receive distribution package for processing and installation on the mobile device.
  • VPN handler 68 provides all low-level communication handling for access to enterprise network 16 via secure VPN gateway 12. For example, VPN handler 68 handles interaction and authentication to VPN gateway 12, establishment and deconstructing of a secure data connection conforming to a security scheme, such as SSL or IPSec protocols, and the formation of encrypted outbound packets to be tunneled and the processing of inbound packets to decrypt those packets received from the tunnel. In one embodiment, VPN handler 68 supports both SSL and IPSec protocols and, as described in further detail below, may intelligently and dynamically switch between the two depending upon the state of the VPN connection to VPN gateway 12.
  • VPN control application 80 provides user interface by which a user is able to configure and manage VPN handler 68 as well as other services integrated within the multi-service client, including security manager 84. For example, VPN control application 80 allows a user to submit credentials and instruct VPN handler 68 to dynamically instantiate a secure VPN connection with secure VPN gateway 12 or deconstruct an existing VPN connection.
  • In one embodiment, VPN control application 80 provides an interface that translates communications with secure VPN gateway 12 such that the information typically available to the user over a web browser (e.g., FIGS. 2 and 3 described above), are dynamically rendered in a user interface presentable in native format on mobile device 19. In other words, in this example, VPN control application 80 may dynamically parse HTML links and other information from Hypertext Transfer Protocol Secure (HTTPS) responses from secure VPN gateway 12 and render a window suitable for display on mobile device 19 using input mechanisms (e.g., icons, radio buttons) native to the device.
  • Upon creation of a secure VPN connection with secure VPN gateway 12, the user can interact directly with the U/I of VPN handler 68 as if the user where accessing his or her default web page normally presented by VPN gateway 12 via an HTML web page. For example, the user may interact with VPN handler 68 to select icons that have been dynamically constructed to correspond to the HTML bookmarks of the user's home web page. The user can, for example, engage an input button corresponding to an administrator-defined link 44 to access web mail as if the user was using a web browser. However, instead of viewing the mail via a web browser when accessing VPN gateway 12 via an endpoint computing device 18, VPN handler 68 may launch an email application provided by, and thus native to, mobile device 19 as if the email bookmark with the web-based home page were selected by the user.
  • In addition to using VPN handler 68, the user is able to launch other applications 82 that may be deployed on mobile device 19 for accessing protected resources 14 over the VPN connection. In this case, VPN handler 68 receives application-layer data from user applications 82 that has been redirected to the VPN handler via O/S interface 66. VPN handler 68 encapsulates the application-layer data to secure packets for tunneling over the VPN connection, and returns the secure packets to operating system 64 for output via transmitter 72 via radio signals. VPN handler 68 receives inbound packets from operating system 64 that are associated with the VPN connection, processes the secure packets to extract and reform application-layer data, and passes the application-layer data to user applications 82. In this way, VPN handler 68 may be used as a single point of entry for secure enterprise access from mobile devices and endpoint computing devices alike without requiring separate support for different types of applications.
  • In one embodiment, VPN handler 68 maintains the VPN connection even after the VPN control application 80 quits. Thus, VPN control application 80 need not be active to allow other user applications 82 to utilize the tunnel. VPN handler 68 may be configured to automatically tear down the VPN connection in the event mobile device 19 is put to sleep. When mobile device 19 wakes up, VPN handler 68 automatically brings the VPN connection to an active state. In some cases, VPN handler 68 monitors the amount of traffic flow on the VPN connection so as to detect idle VPN connections and automatically disconnect the VPN connection after a user-configurable amount of idle time.
  • In some embodiments, VPN handler 68 registers a pre-defined, custom URL format with operating system 64. When other user applications 82 invoke O/S interface 66 directly to "launch" a URL that conforms to these special formats, operating system 64 automatically launches the application that registered the URL format. In one example, VPN handler 68 registers a custom URL format with the following form:
    • junaspulse://<server-host>/<server-path> ?method= {vpn} &action= {start|stop} &DSID=<dsid-cookie>&SMSESSION=<smsession-cookie>.
    When this URL is "launched" by another application 82, operating system 64 loads VPN handler 68, if necessary, and invokes the VPN handler with a call-back function that passes in the specific URL. At this point, VPN handler 68 determines whether a VPN connection is already established. If a VPN tunnel is not currently established and the doConnect flag is '1' then VPN handler 68 automatically determines whether a VPN profile exists with a URL that matches the URL received from operating system 64. If not, then VPN handler 68 automatically creates a new VPN profile with the passed-in URL. If session cookies are specified in the launch URL received from operating system 64, VPN handler 68 establishes the new VPN tunnel with the given session cookies. If there are no session cookies specified in the launch URL, VPN handler 68 accesses secure VPN gateway 12 in normal course and the user is taken through the normal login process. If VPN handler 68 confirms that a VPN tunnel is already established and the "redirectOnConnected" of the launch URL is set to '1', VPN handler 68 may redirect execution to a web browser application or other default one of applications 82 and exit without tearing down the tunnel.
  • Security module 84 is a software thread provided by the mult-service client that, when installed, is continuously executed in the background by operation system 64 to provide certain security functions for mobile device 19. As one example, security manager 84 may provide anti-virus and spyware detection functions for mobile device, and VPN handler 68 transparently shunts traffic to the security module for application of the security services. VPN control application 80 may provide a user interface for configuring anti-virus settings, personal firewall settings and other parameters associated with of the security module 84.
  • Furthermore, in accordance with the techniques described herein, VPN handler 68 registers with security manager 84, and the security manager provides up-to-date security information to the VPN handler. Moreover, VPN handler 68 may locally require active, registered anti-virus and spyware software and up-to-date virus definitions before allowing a VPN connection to be established with VPN gateway 12. This local enforcement may be controlled by policies received from VPN gateway 12 during the login and authentication process.
  • In some embodiments, VPN handler 68 incorporate a "host checker" module that inventories a state of mobile device 19, builds a health status report and passes the health status report to VPN gateway 12 at the time of login for processing and determination as to whether mobile device 19 is compliant with corporate policies. For example, VPN handler 86 may collect and forward up-to-date "health information" to VPN gateway 12 at the time establishment of the VPN connection is requested. In general, the term "health information" is used herein to generally refer to data that describes a security state of mobile device 19. For example, the health information may describe whether the specific mobile device contains potentially malicious software (e.g. a known virus or spyware), whether the endpoint device has invalid configuration, or whether approved countermeasures (e.g., anti-virus software) have been properly installed on the endpoint device. In some cases, VPN gateway 12 may prevent access or allow limited access based on both the current health information of mobile device 19 and the particular user that is requesting the VPN connection. Further details of such techniques for controlling access based on health information of a mobile device can be found in U.S. Patent Application, 11/236,987, Filed September 28, 2005 , entitled "NETWORK DEFENSE SYSTEM UTILIZING ENDPOINT HEALTH INDICATORS AND USER IDENTITY," the entire contents of which are incorporated herein by reference.
  • Although deployed as a single package 67, VPN handler 68 and VPN control application 80 are configured such that they may be independently upgraded. For example, the user may be able to upgrade both VPN handler 68 and VPN control application 80 via retrieving the latest distribution package 67 from the electronic repository for user applications provided by the manufacturer of mobile device 19. In addition, the VPN handler may be programmed so as to automatically upgrade itself upon establishing a connection to a secure VPN gateway 12 in the event a newer version exists for the VPN handler and the secure VPN gateway that has been configured to require that the mobile device has the newest version of the handler. In this case, the new version of VPN handler 68 will be downloaded directly from the secure VPN gateway 12 or a server associated with the VPN gateway.
  • In some cases, VPN control application 80 is programmed such that when the user launches the VPN control application for the first time, the VPN control application prompts the user with a security warning asking if he or she wishes to enable SSL-VPN functionality. This can be a useful security precaution to prevent malicious software from silently installing VPN software without the user's knowledge. If the user declines, VPN control application 80 may display a splash screen until the user quits the application. If the user accepts, the decision is recorded until the device's memory is wiped.
  • FIG. 4B is a block diagram of a second example embodiment of mobile device 19 that operates in accordance with the techniques described herein. In this example, mobile device 19 includes a distribution package 77 that provides a multi-service network client having VPN handler 68, VPN control application 80, security manager 84, acceleration service 92, and collaboration services 94. The multi-service network client may be distributed as a single distribution package 77 from a standard "app" deployment mechanism provided by a manufacturer of mobile device 19. In this way, distribution package 77 provides an integrated, multi-service VPN client like distribution package 67 of FIG. 4A. In this example, similarly numbered components function as described with respect to FIG. 4B.
  • Acceleration service 92 of the multi-service network client provides integrated data acceleration services for mobile device 19 and may utilize a number of different acceleration techniques. VPN control application 80 provides a unified user interface that allows a user to configure both VPN handler 68 and the acceleration service 92.
  • As a first example, acceleration service 92 may be configured to provide a local, small-footprint content cache. In this case, acceleration service 92 may cache content received in response to requests previously issued by VPN control application 80 or user applications 82 and retrieved from enterprise network 16 or, more generally, public data network 21. VPN handler 68 may, for example, intercept HTTP or HTTPS get requests and query acceleration service 92 to determine if the requested network content is cached locally before encapsulating the requests in the VPN tunnel and issuing the request to O/S interface 66 for output to secure VPN gateway 12. If the content is not cached, VPN handler 68 tunnels the request to secure VPN gateway 12 in normal course and, upon receiving a response, updates the local content cache. VPN handler 68 utilizes the content cache to service subsequent requests. In addition, acceleration service may be configured to interact with upstream caches provided by the service provider or the enterprise. In this manner, acceleration service 92 may increase the overall efficiency of downloading content from secure VPN gateway 12 or otherwise.
  • As a second example, acceleration service 92 may be configured to provide a client-side decompression service that operates in conjunction with an upstream acceleration device that provides real-time, continuous pattern recognition and compression of data flows. For example, an upstream acceleration device may employ pattern recognition and an efficient compression algorithm that is capable of detecting and eliminating repeated phrases of variable length to provide continuous acceleration of a data stream. Acceleration service 92 may maintain a phrase dictionary that is synchronized with a phrase dictionary of the upstream device, and may utilize the phrase dictionary to rebuilt compressed data streams from the upstream compression device. In this way, transmission acceleration may be provided all the way to mobile device 19, including over the wireless transmission medium, without requiring standalone downstream wan acceleration devices. Further example details of continuous data compression using synchronized upstream and downstream devices are described in U.S. Patent 6,856,651, Amit P. Singh , entitled "SYSTEM AND METHOD FOR INCREMENTAL AND CONTINUOUS DATA COMPRESSION," filed May 30, 2001, the entire contents of which are incorporated herein by reference.
  • As a third example, acceleration service 92 may be configured to provide transparent application-specific protocol optimization to improve transfer efficiencies for mobile device 19.
  • In some deployments, acceleration service 92 may be used with data flows associated between mobile device 19 and the remote enterprise network. For example, acceleration service 92 may operate as a client-side component that leverages server-side wan acceleration services deployed within secure VPN gateway 12 or within other acceleration devices of enterprise network 16. However, use of acceleration service 92 is not limited to enterprise VPN environments. For example, as further discussed with respect to FIG. 4C, acceleration service 92 may be used in conjunction with acceleration devices deployed within service provider network 20 for data flows that do not pass through the VPN connection.
  • Collaboration components 94 provide an integrated package of collaborative applications that can be used in conjunction with any VPN connection established by VPN handler 68 or in a non-enterprise environment. As one example, collaboration components may provide software for network meetings, secure desktops, document sharing or other software that may aid the user in collaborating with others.
  • FIG. 4C is another block diagram of system 10 (FIG. 1) and shows the multi-service network client described herein deployed to two mobile devices 19A and 19B. In this example, each of mobile devices 19A, 19B include distribution package 77 of FIG. 4B, and each have an integrated network client that provides a VPN handler, a VPN control application, a security manager, an acceleration service, and collaboration services.
  • In the example of FIG. 4C, VPN handler 68 executing on mobile device 19B has established VPN connection 95 with secure VPN gateway 112 of enterprise network 16 in accordance with the techniques described herein. Moreover, the VPN handler transparently invokes the integrated acceleration service 92 to provide compression and acceleration services for VPN connection 95. Further, as shown in FIG. 4C, the acceleration service of mobile device 19B operates in concert with upstream acceleration device 98 of enterprise network 16 to provide for pattern recognition for WAN acceleration.
  • Further, in this example, mobile device 19A is utilized without an enterprise network and, in particular, without establishing a VPN connection with a remote secure VPN gateway. In this case, the VPN handler of the multi-service network client operates as a transparent front-end for distributing packet flows to the acceleration service, security manager, and collaborative services that are integrated within distribution package 77 without providing VPN tunneling services for data flows 96. That is, the VPN handler need not establish a VPN connection nor provide encryption / decryption services to the packet flows, but nevertheless seamlessly applies the other integrated services to data flows 96 between mobile device 19A and public resources 99 accessible via packet data network 21, such as the Internet. For example, as shown in FIG. 4C, the VPN handler executing on mobile device 19A still receives and send packets to an O/S interface and, at this time, seamlessly routes the packets through the integrated acceleration service (such as acceleration service 92 of FIG. 4B) to provide compression and acceleration services for data flows 96. Further, as shown in FIG. 4C, the acceleration service of mobile device 19A operates in concert with upstream acceleration device 97 of service provider network 20 to provide for pattern recognition for WAN acceleration. In addition, the acceleration service may provide a content cache, file compression and other services. Similarly, the VPN client of mobile device 19A integrates with the security manager of the distribution package to provide anti-virus and spyware detection functions for mobile device. For example, even though the VPN handler operates as a transparent pass-through without tunneling packets through a VPN connection, the VPN handler of mobile device 19A may locally require active, registered anti-virus and spyware software and up-to-date virus definitions before allowing packets to be communicated to service provider network 20 via data flows 96.
  • In this way, a user of a mobile device may deploy and utilize the multi-service network client described herein either as an enterprise solution, as strictly a consumer application without enterprise VPN connectivity, or both. In either case, the VPN control application provides a unified user interface and the internal VPN handler may be used to provide a front-end for routing inbound and outbound packets through the other services, such as acceleration and security regardless of whether the VPN handler is configured to establish a VPN connection and tunnel the packets through the VPN connection. Further, the executables associated with the multi-service VPN client may be similar or even identical for the different deployments, with certain functionality disabled for the non-enterprise deployment. This may allow a user to convert the multi-service VPN client from a non-enterprise deployment to an enterprise deployment and full VPN functionality by merely entering a key or authentication code without requiring installation of addition executable software.
  • FIG. 5 is a schematic diagram illustrating a front view of one embodiment of mobile device 19. In this example, mobile phone includes a touch screen for presenting an interactive display 100 having a plurality of icons, each corresponding to a different user-launchable application. In this case, display 100 includes an icon 102 with which a user interacts to launch VPN control application 80.
  • FIG. 6 illustrates display 110 presented by VPN control application 80 once launched. In this example, display 110 is presented in the native format of mobile device 19 and, in the example embodiment, is not a web page. As shown in FIG. 1, display 110 as a Home window for the user that includes seven icons that provide quick access for the user to common functions, including an icon for accessing the enterprise intranet, an icon for accessing email, an icon for managing the VPN connection, an icon for signing into the enterprise, an icon for setting a current user profile, an icon for viewing related logs and an icon for viewing "About" information for the VPN handler. In the case of FIG. 6, no current profile has been selected for the user and no VPN session has been created. That is, before they can connect, the user must select a server to which connect. When VPN control application 80 is launched for the first time no server will be selected. VPN control application 80 allows the user to define profiles and, for each profile, specify an address for target server or security appliance (e.g., secure VPN gateway 12) for the profile. In addition, display 110 includes a status bar 111 and an indicator light 112 that represents the status of whether any VPN connection has been established
  • FIG. 7A illustrates display 120 presented by VPN control application 80 when the user elects to manage and ultimately select a user profile. In this example, display 120 lists two profiles (Test Profile, and Corporate Profile) and includes an input mechanism 122 that allows the user to create a new user profile.
  • FIG. 7B illustrates display 125 presented by VPN control application 80 when the user selects input mechanism 122 (FIG. 7A) and creates a new user profile. In this example, the user is able to enter a profile name and a URL or address associated with the target enterprise. In some cases the user may also select a particular digital certificate from a list of certificates installed on mobile device 19. VPN handler 68 uses the selected certificate for user authentication when establishing the VPN connection with secure VPN gateway 12 associated with the specified address or URL.
  • FIG. 8A illustrates display 130 presented by VPN control application 80 after the user has created and selected a user profile, i.e., Acme Gizmo, Inc., for quick VPN access. At this time, the user has not yet signed in and a VPN connection has not yet been established. Display 130 presents a Sign In icon for one-click initiation of the sign-in process.
  • FIG. 8B illustrates display 135 presented by VPN control application 80 after the user has selected the Sign In icon of Home display 110 (FIG. 6) to initiate the sign-in process using the Acme Gizmo, Inc. profile. In response, VPN handler 68 has initiated communication with secure VPN gateway 12 via HTTPS, which returns an HTML-based login page. In some cases, VPN control application 80 specifies a specific HTTP user agent in the HTTPS request during the login phase to signal to VPN gateway 12 that the requesting device is a mobile device, thereby allowing VPN gateway 12 to select customized web-pages for the device. VPN control application 80 parses data from the returned HTML source code and renders display 135 within the native display of mobile device 19 to present authentication input mechanisms.
  • FIG. 9A illustrates display 137 presented by VPN control application 80 after VPN handler 68 has successfully authenticated the user logged into the enterprise and established the VPN connection with VPN gateway 12. In this case, the administrator has defined a plurality of different roles for the user. Moreover, each of the roles may be allow access to a specific set of protected resources 14. To further increase security, the administrator may configure secure VPN gateway 12 to present all or only an identified subset of the user's roles to the user when VPN access is being made through mobile device 19, which may be more readily stolen and compromised versus a home computer. In addition, the administrator may be able to further refine the set of roles available to the user based on position information received from mobile device 19 at the time the VPN connection is established, where the position information my comprise GPS coordinates of the mobile device, cell information identify a current cell, or a combination thereof. For example, secure VPN gateway 12 may allow the administrator to define certain geographic regions and assign those geographic regions a level of trust. In addition, the administrator may specify a required level of trust for a role to be made available to a user over the VPN connection, and the required level of trust can be specified on a per-user basis. From the overall roles for the user, secure VPN gateway 12 constructs a set of roles to be presented to the user by mobile device 19. Secure VPN gateway 12 may determine the set, for example, based on a level of trust assigned by the administrator for the geographic region in which mobile device 19 is currently positioned as well as any user-specific threshold level of trust assigned by the administrator that must be met before a given role is available for the particular user when using a mobile device. For example, the administrator may specify a level of trust of '5' (e.g., full trust) for the United States and '3' (moderate trust) for a second geographic region that the administrator or enterprise policies deems more likely of a security risk. In addition, the administrator may assign a required level of '5' to an "administrator role." As such, those users eligible for the "administrator role" may be presented with such an option when accessing secure VPN gateway 12 within mobile device 19 from within the United States but not when accessing the secure VPN gateway from the second geographic region.
  • FIG. 9B illustrates display 140 presented by VPN control application 80 as the Home after authentication and establishment of the VPN connection with VPN gateway 12. As such, indicator 112 is rendered to show the connectivity state, and status bar 111 shows the user name and the elapsed connection time. In addition, the Sign In icon has been replaced with a Sign Out icon that allows the user to terminate the VPN connection.
  • FIG. 10 illustrates a display 150 presented by VPN control application 80 when the user has selected the Sign Out icon from the Home screen. Once selected, the user is returned to the home screen and prompted for confirmation.
  • FIG. 11 illustrates display 160 presented by VPN control application 80 after the user has selected the VPN icon from Home display 110 (FIG. 6). As shown, display 150 presents certain configuration parameters for the establishment of the VPN, such as whether to automatically establish the VPN connection upon authenticating to the enterprise and receiving any session data. When automatic sign-in is disabled, VPN handler 68 does not create the VPN connection even though authentication has been completed. Instead, VPN handler 68 waits until application-layer data has been received from either VPN control application 80 or other user applications 82. In this way, fees and charges associated with data transfer over cellular data services may be reduced. In addition, the number of open session VPN gateway 12 is required to maintain and service may also be reduced.
  • Display 160 also presents current information associated with the VPN connection, including a current number of bytes sent and a current number of bytes received since the VPN connection was established. In addition, display 160 includes a Disconnect button that allows the user to terminate the VPN connection.
  • FIG. 12 illustrates display 170 presented by VPN control application 80 after the user has selected the Intranet icon from display 110 (FIG. 6). As shown, display 160 represents a translated version of the user's default home web page in a format that can be rendered by the VPN control application. Moreover, VPN control application 80 presents display 170 rather than the display being presented as a web page through a web browser installed on mobile device 19. When the user selects the Intranet icon from the native Home window of display 110, VPN control application 80 issues an HTTPS get request to retrieve the user's bookmark web page (FIG. 3) that would normally be presented as a full web page to the user if the user where accessing VPN gateway 12 via an endpoint computing device 18.
  • In this example, VPN control application 80 dynamically parses links and other bookmark information from the HTTPS response from secure VPN gateway 12 when accessing the home web page and dynamically builds a window for display 160 on mobile device 19. In this way, display 170 is built and presented as a display as part of VPN control application 80 and not as a web page of a separate web browser installed on mobile device 19. That is, VPN control application 80 dynamically constructs display 160 to include input controls that are native application controls provided by mobile device 19, where each of the input controls corresponds to a different bookmark parsed from the HTML response received from VPN gateway 12. As shown, VPN control application 80 has dynamically constructed display 160 to include a set of input controls 162 for the user-defined bookmarks and a second set of input controls 164 that correspond to the administrator-defined bookmarks of the user's default home web page (FIG. 3). Each of the bookmarks is represented by an input button graphic that is supported by the native display of mobile device 19. In response, VPN control application 80 formulates and outputs an appropriate HTTP string as if a corresponding HTML link were selected by the user. Thus, bookmarks 162, 164 are not web-based URLs as normally embedded in web pages, but operate as buttons on mobile device 19 and serve the purpose of pseudo-links within the context of the enterprise VPN. Example links that can be translated and rendered on mobile device 19 include links to local file servers, a link to an intranet file server, a link for a pre-configured remote desktop terminal session for the user that may run over the VPN connection.
  • In one example, VPN control application 80 includes an internal HMTL parser and extraction of bookmark information is performed in real-time using combination of XPath queries on the HTML and processing logic on the set of elements returned by the XPath query. Further details on the XML Path Language (XPath) can be found in "XML Path Language (XPath)", Version 1.0, available from World Wide Web Consortium (W3C), November 16, 1999, the entire content of which is incorporate herein by reference.
  • In one example, VPN control application 80 retrieves the bookmark web page by issuing a direct request for an index.cgi file for the particular VPN user. Next, VPN control application 80 parses the response from VPN gateway 12 with its internal HTML parser using the following search algorithm to extract the bookmarks' URLs and titles. First, in the HTML returned by index. cgi, VPN control application 80 issues XPath queries to locate all anchor elements with href attributes which contain "launch.cgi." In one example, this is achieved by the following XPath query: //a [contains(@href, launch.cgi')]. Next, on the set of elements returned by the above criteria, VPN control application 80 iterates over all children and extracts bookmark captions from the elements with simple string content.
  • The following is an example excerpt from HTML of index.cgi showing the code related to a single bookmark:
    Figure imgb0001
    Figure imgb0002
    Figure imgb0003
    VPN control application 80 extracts the actual URL of each bookmark from the anchor href attribute. VPN control application 80 eliminates any duplicates which can occur due to icon links in the HTML.
  • Having found the anchor element for the bookmark, VPN control application 80 locates the corresponding description by getting all sibling elements of that anchor and finding the one which has simple string content. In the HTML example snippet given, this would be the <span> element with a content of "Sample Bookmark description".
  • VPN control application 80 is able to distinguish custom bookmarks based on the presence of the additional link for editing them. These links can be found enumerating the anchor items which have editbk.cgi in their href attribute. This can be done with the following XPath query: //a[contains(@href, 'editbk.cgi')]
  • For example, the following links may be extracted as bookmarks:
    • https://secure.acmegizmo.com/dana/home/launch.cgi?url=http%3 A%2F%2Fintran et.acmegizmo.com
    • https://secure.acmegizmo.com/dana/home/launch.cgi?url=http%3A%2F%2Fintran et.acmegizmo.com%2Fcgi-bin%2Fdbpro.cgi
    • https://secure.acmegizmo.com/dana/home/launch.cgi?url=http%3A%2F%2Fag-exchange3.acmegizmo.com%2Fexchange%2F
    • https://secure.acmegizmo.com/dana/home/launch.cgi?url=http%3A%2F%2Fintran et.acmegizmo.com%2Fit%2Fsecurity.html
    Having only one anchor element containing editbk.cgi in href attribute, VPN control application 80 determines the first three are standard bookmarks and the last one is custom one set by the user.
  • When a user selects a bookmark from the native UI displayed by VPN control application 80, the VPN control application opened it is opened in an embedded browser control that is hidden from the user. The browser is navigated directly to the URL extracted for the given bookmark and may be presented to the user as a web page via a browser or may dynamically processed into the native display of mobile device 19.
  • In some case, VPN control application 80 looks for a specially configured bookmark with the following example name: "Mobile Webmail." If such a bookmark exists, the Email icon (FIG. 6) will launch a web-based email in a browser, opening the Mobile Webmail bookmark link. Alternatively, instead of launching a web browser, VPN handler 68 may launch a native email application provided by mobile device 19.
  • VPN control application 80 allows an administrator to define a custom page to be displayed instead of the standard bookmarks page. VPN control application 80 detects whether the bookmarks page has been returned by VPN gateway 12 or not. If a custom page is being opened as part of the standard flow, then VPN control application 80 displays this custom page in place dynamically constructing the native user interface for bookmarks.
  • FIG. 13 illustrates display 170 presented by VPN control application 80 after the user has toggled from the bookmark view (FIG. 12) to a view of a history of previously selected pseudo-links.
  • FIG. 14 illustrates display 185 presented by VPN control application 80 after the user has selected the LOGS icon from display 110 (FIG. 6). As shown, display 185 presents a transaction window 187 for listing activity related to the VPN connection including date and time stamps for each action. In some cases, VPN control application 80 may also provide input mechanisms that allow the user to upload the log to secure VPN gateway 12 or automatically attaching them to email for emailing them to an administrative email address specified by secure VPN gateway 12. This may provide an easy and efficient mechanism by which the user can obtain assistance with setting up the VPN connection on his or her mobile device 19.
  • In some embodiments, VPN handler 68 may utilize a form of compression when communicating with VPN gateway 12 over the VPN tunnel. That is, VPN handler 68 may compress the application-layer data within the carried by the payloads of the tunneled packets. After compressing the data, VPN handler 68 encrypts and encapsulates the data to form secure packets for tunneling to VPN gateway 12. This allows VPN handler 68 to reduce the amount of bandwidth consumed by the VPN connection, which may be important in a mobile environment.
  • In one embodiment, VPN handler 68 includes algorithms for applying Lempel-Ziv (LZ) compression in conjunction with an IPSEC connection to tunnel encrypted IP packets, i.e., Encapsulation Security Payload (ESP) packets, on top of a connection-less protocol, e.g., IP or User Datagram Protocol (UDP), to VPN gateway 12. In this case, UDP is used as the transport layer for with use of LZ compression integrated with IPSEC for compressing and securing outbound tunneled packets and for decompressing inbound tunneled packets.
  • In some embodiment, VPN handler 68 supports both SSL and IPSec protocols is programmed to intelligently and dynamically switch between the two depending upon the state of the VPN connection to VPN gateway 12.
  • VPN handler 68 handles interaction and authentication to VPN gateway 12, establishment and deconstructing of a secure data connection conforming to a security scheme, such as SSL or IPSec protocols, and the formation of outbound packets to be tunneled and the processing of inbound packets received from the tunnel.
  • That is, in some cases, VPN handler 68 may establish an IPSec VPN may be established to tunnel encrypted IP packets on top of a connection-less protocol, e.g., IP or User Datagram Protocol (UDP). In other cases, VPN handler 68 may use and SSL VPN to tunnel IP packets on top of a Layer 4 connection-oriented protocol, e.g., Transmission Control Protocol (TCP). That is, VPN handler 68 recognizes that TCP inherently introduces latency with SSL VPN tunnel relative to IP SEC over UDP, yet in some cases may provide connectivity through firewalls that typically recognize SSL packets but block UDP packets. For this reason, VPN handler 68 may be programmed to adaptively failover between an L3-based IPSEC network tunnel using UDP as a transport protocol and an L4-based SSL network tunnel that uses TCP as a transport.
  • For example, in some embodiment, VPN handler 68 may first establish the VPN connection ton include an SSL VPN tunnel by performing a key exchange with secure VPN gateway 12. In this case, VPN handler 68 may encapsulate initial application-layer data within a SSL encrypted packet stream flowing on through the SSL VPN tunnel between the mobile device 19 and the secure VPN gateway 12. Although an SSL VPN tunnel can operate in most remote network environments including firewalls and proxies, tunneling packets on top of the connection oriented TCP inherently introduces latency, complexity and potentially increased bandwidth, all of which may be of significant concern in a mobile environment. Therefore, VPN handler 68 may also establish a parallel IPSec VPN tunnel with secure VPN gateway 12 for the VPN connection while simultaneously sending the any initial data packets on SSL VPN tunnel. VPN handler 68 may send test messages, i.e., discovery packets, over the IPSEC VPN tunnel in parallel with sending data over the SSL VPN tunnel. If VPN handler 68 receives a reply to the test messages on IPSec VPN tunnel 62, VPN handler 68 stops sending data on the SSL VPN tunnel and instead automatically (e.g., without manual intervention) utilizes to IPSec VPN tunnel. At this point, VPN handler 68 may tear down the SSL VPN tunnel or, in many cases, may leave the SSL connection established. In this way, if the remote network environment changes and the data packets can no longer reach the corporate network on the IPSec VPN tunnel, VPN handler 68 automatically (e.g., without manual intervention) returns to the SSL VPN tunnel. In some embodiments, VPN handler 68 may use a single IP address assigned to mobile device 19 by secure VPN gateway 12 for the VPN for both of the tunnels and effectively dynamically change the type of transport layer protocol (e.g., TCP or UDP) of the operating system and the security service (e.g., IP SEC and SSL) applied to tunneled packets. In some embodiments, VPN handler 68 and secure VPN gateway 12 may operate in accordance with the techniques set forth in U.S. Patent Application 11/226,501, filed September 14, 2005 , entitled "ADAPTIVE FAILOVER BETWEEN LAYER THREE AND LAYER FOUR NETWORK TUNNELS," the entire contents of which are incorporated herein by reference.
  • In some cases, the adaptive transition between SSL and IPSEC VPN connections by VPN handler 68 may be particularly advantageous in mobile device 19 because, in some cases, operating system 64 may already be using UDP ports associated with IP SEC. In this case, an IPSEC VPN connection by a higher-level VPN handler 68 (e.g., a VPN handler executing in kernel mode) may have IP SEC communications consumed or otherwise blocked by operating system 64 since the operating system may incorrectly operate as if the IP SEC packets are to be processed by the operating system. In such cases, VPN handler 68 may establish the VPN connection and initially utilize SSL and automatically transition from an SSL tunnel with TCP transport (e.g., an L4 tunnel) to the an IPSEC tunnel with UDP transport (e.g., an L3 tunnel) without terminating the VPN connection only when the UDP network ports associated with the L3 tunnel are unblocked by the operating system. As such, the techniques described herein allow VPN handler 68 to be easily downloaded, installed and deployed on mobile device 19 without requiring user intervention as to the tunneling mechanism that is compatible with the lower-level operating system-level components of the mobile device.
  • Some embodiments of VPN handler 68 perform a fast reconnect in the event communication with secure VPN gateway 12 is temporarily lost. More specifically, establishes an SSL control channel by issuing an HTTPS request to secure VPN gateway 12. Upon a successful authentication, secure VPN gateway 12 provides a session cookie with a unique identifier that the secure VPN gateway maps to specific user information. This allows VPN handler 68 in the event the VPN connection is temporarily lost. This may be especially important on mobile devices due to constantly changing network conditions such as transition between base stations, switching between a wireless local area network ("WiFi") and cellular packet-based network connections, and power state transitions. In the event the status of the network connection has changed by mobile device 19, O/S interface 66 may set a semaphore or other signaling mechanism to signal the change. In response, VPN handler 68 issues another HTTPS request and includes the session cookie, which allows the VPN handler to re-establish the VPN connection with secure VPN gateway 12 without requiring the user repeat the typical authentication process. In some cases, VPN handler 68 determines which type of transport mechanism is available, WiFi or cellular, to mobile device 19. In the event only a cellular packet-based network connection is available and not the WiFi connection, VPN handler 68 may selectively defer fast reconnect even though a valid, unexpired session cookie exists on mobile device 19. In particular, VPN handler 68 may defer fast reconnect until application-layer data is received from user applications 82. In some cases, VPN handler 68 defers fast VPN reconnect until receiving another event from O/S interface 66 indicating that network traffic is pending or has been initiated by user applications 82. In this way, VPN handler 68 may potentially reduce user fees associated with minutes or bandwidth consumption for data services that may arise with an established yet idle VPN connection.
  • FIG. 15 is an example user interface 190 presented by secure VPN gateway 12 by which an administrator is able to provide a variety of configuration parameters for administering secure access to endpoint computing devices 18 and cellular mobile devices 19. In particular, user interface 190 allows the administrator to enter configuration data with respect to endpoint compliance functions and host checker functions As shown in FIG. 16, user interface 190 includes a check box input control 192 by which an administrator is able to specify a host checker requirement related to security manager 84. That is, the administrator is able to specify that a pre-requisite to authorizing secure access to the enterprise is that the health status report generated by the integrated host checker functions of the multi-service client for the mobile device 19 must indicate that anti-virus and spyware software for security manager 84 are registered, enabled and up-to-date. In not, secure VPN gateway may deny access or provide quarantined access to limited resources required to download any out-of-date security component to mobile device 19.
  • The techniques described in this disclosure may be implemented, at least in part, in hardware, software, firmware or any combination thereof. For example, various aspects of the described techniques may be implemented within one or more processors, including one or more microprocessors, digital signal processors (DSPs), application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), or any other equivalent integrated or discrete logic circuitry, as well as any combinations of such components. The term "processor" or "processing circuitry" may generally refer to any of the foregoing logic circuitry, alone or in combination with other logic circuitry, or any other equivalent circuitry. A control unit comprising hardware may also perform one or more of the techniques of this disclosure.
  • Such hardware, software, and firmware may be implemented within the same device or within separate devices to support the various operations and functions described in this disclosure. In addition, any of the described units, modules or components may be implemented together or separately as discrete but interoperable logic devices. Depiction of different features as modules or units is intended to highlight different functional aspects and does not necessarily imply that such modules or units must be realized by separate hardware or software components. Rather, functionality associated with one or more modules or units may be performed by separate hardware or software components, or integrated within common or separate hardware or software components.
  • The techniques described in this disclosure may also be embodied or encoded in a computer-readable medium, such as a computer-readable storage medium, containing instructions. Instructions embedded or encoded in a computer-readable medium may cause a programmable processor, or other processor, to perform the method, e.g., when the instructions are executed. Computer readable storage media may include random access memory (RAM), read only memory (ROM), programmable read only memory (PROM), erasable programmable read only memory (EPROM), electronically erasable programmable read only memory (EEPROM), flash memory, a hard disk, a CD-ROM, a floppy disk, a cassette, magnetic media, optical media, or other computer-readable storage media. It should be understood that the term "computer-readable storage media" refers to physical storage media, and not signals or carrier waves, although the term "computer-readable media" may include transient media such as signals, in addition to physical storage media.
  • A cellular mobile device and method performed by the cellular mobile device are described. The device may comprise a transmitter and receiver to send and receive cellular communications in the form of radio frequency signals, a microprocessor, an operating system executing on the microprocessor to provide an operating environment of application software, and a multi-service network client registered with the operating system as a single application. The multi-service network client comprises a virtual private network (VPN) handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device. The network client may include a security manager to receive the decrypted inbound network packets from the VPN handler and apply at least one security service to the decrypted network packets, and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the security manager. The multi-service network client may be deployed from a single downloadable distribution package. The VPN control application may present a unified user interface for configuring anti-virus settings and personal firewall settings of the security manager. The security manager may apply anti-virus and spyware services to the network packets and provide an interface by which the VPN handler determines whether a user of the cellular mobile device has activated and registered the security manager. The VPN handler may require an affirmative indication from the security manager prior to establishing the VPN connection with the VPN gateway. The VPN handler may comprise a host checker module that inventories a state of the cellular mobile device and builds a health status report, and the host checker may output the health status report to the VPN gateway prior to establishing the VPN connection for determining whether the cellular mobile device is compliant with corporate policies. The multi-service network client may further comprise a data acceleration module that applies at least one acceleration service to the network packets from the VPN handler. The data acceleration module may provide a local content cache, a client-side decompression service that operates in conjunction with an upstream acceleration device to provide real-time, continuous pattern recognition and compression of data flows within the network packets, and/or application-specific protocol optimization for control flows within the network packets. The multi-service network client may further comprise one or more collaboration components that process the packets from the VPN handler, wherein collaboration components provide collaboration services including at least one of a network meeting, a secure desktop or a document sharing service. The VPN control application may provide a user interface that allows a user to disable VPN connectivity, and, when VPN connectivity is disabled, the VPN handler may exchange the network packets with the operating system and transparently provides the packets to the security manager for application of the security service. The user interface of the VPN control applications allows the user to submit credentials and instruct the VPN handler to dynamically instantiate the secure VPN connection or deconstruct an existing VPN connection. Upon establishing the VPN connection, the VPN control application may receive a web-based home page from the secure VPN device via an Hypertext Transfer Protocol Secure (HTTPS) response. The secure VPN connection dynamically parses HyperText Markup Language (HTML) bookmark links from the HTTPS response and renders a bookmark window using input controls native to the cellular mobile device, where each of the input controls corresponds to a different one of the bookmarks parsed from the HTML response received from the secure VPN gateway, and, upon selection of one of the input controls, the VPN control application may formulate and output an appropriate HTTP string to the secure VPN device as if a corresponding HTML link were selected by the user. The VPN control application may detect within the HTTPS response one of the bookmarks that provides a link to a webmail for the user, and, upon detecting the bookmark for the webmail, the VPN control application dynamically constructs the user interface to have an input control for launching a native email client of the cellular mobile device to access the email without launching a web browser. The VPN handler and the VPN control application may be configured to be independently upgradable. The VPN handler may establishe the VPN connection as an Internet Protocol Security (IPSec) connection over User Datagram Protocol (UDP), and the VPN handler may include a compression module that applies Lempel-Ziv (LZ) compression in conjunction with the IPSec connection to tunnel encrypted IP packets to the secure VPN gateway. The VPN handler establishes an Secure Socket Layer (SSL) control channel with the secure VPN gateway and, upon a successful authentication, receives a session cookie with a unique identifier. In the event communication with the secure VPN gateway is temporarily lost, the VPN handler may perform a fast reconnect by issuing the session cookie to the secure VPN gateway. When performing the fast reconnect, the VPN handler may identify a set of transport mechanisms currently available to the cellular mobile device and, when only a cellular network is available and not a wireless packet-based connection, the VPN handler may defer the fast reconnect until application-layer data is received from a user application and ready to be sent via the VPN connection. These features and the other features described herein may be used in any combination.
  • There has been described a cellular mobile device comprising: a transmitter and receiver to send and receive cellular communications in the form of radio frequency signals; a microprocessor; an operating system executing on the microprocessor to provide an operating environment of application software; a multi-service virtual private network (VPN) client registered with the operating system as a single application, wherein the multi-service network client comprises: a VPN handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device; a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets; and a VPN control application that provides a unified user interface that allows a user to configure the VPN handler and the data acceleration module.
  • There has been described a system comprising: a virtual private network (VPN) security device coupled to a packet network; a cellular mobile device comprising a microprocessor, an operating system executing on the microprocessor to provide an operating environment of application software, and a multi-service network client registered with the operating system as a single application, wherein the multi-service network client comprises: a VPN handler to exchange network packets with the operating system, wherein the VPN handler establishes a VPN connection with a remote VPN security device of an enterprise and processes to network packets for tunneling between the cellular mobile device and the remote VPN security device; and a security manager to receive the network packets from the VPN handler and apply at least one security service to the network packets, a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the security manager, wherein the secure VPN device presents an interface by which an administrator defines a plurality of different roles for the user, wherein upon authenticating the user, the secure VPN device selects a subset of the roles for the user, and wherein the secure VPN device controls access to one or more protected resources by the user based on the selected subset of the roles.
  • There has been described a method comprising: receiving, with a cellular mobile device from an electronic repository, a single distribution software package that includes a multi-service network client, wherein the multi-service network client includes a virtual private network (VPN) handler, a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets, and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the security manager; and installing the multi-service network client on the cellular mobile device including registering the VPN handler with an operating system of the cellular mobile device, wherein the VPN handler provides a single point of entry for network packets from the operating system to apply VPN services with the VPN handler and security services with the security manager.
  • There has been described a program product comprising software program code to execute a multi-service network client on a processor within a cellular device, wherein the multi-service network client comprises: a virtual private network (VPN) handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device; a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets; and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the data acceleration module. The program product can comprise a non-transitory computer-readable medium storing a downloadable distribution package comprising the computer program code.
  • Various embodiments of the invention have been described. These and other embodiments are within the scope of the following claims.

Claims (14)

1. A cellular mobile device comprising:
a transmitter and receiver to send and receive cellular communications in the form of radio frequency signals;
a microprocessor;
an operating system configured to execute on the microprocessor to provide an operating environment of application software;
a multi-service virtual private network, "VPN", client registered with the operating system as a single application, wherein the multi-service network client comprises:
a VPN handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler is configured to encrypt outbound network packets and to decrypt inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device;
a data acceleration module configured to exchange network packets with the VPN handler and to apply at least one acceleration service to the network packets; and
a VPN control application configured to provide a unified user interface that allows a user to configure the VPN handler and the data acceleration module.
2. The cellular mobile device of claim 1, wherein the multi-service network client further comprises a security manager to receive the decrypted inbound network packets from the VPN handler and to apply at least one security service to the decrypted network packets;
3. The cellular mobile device of claim 1 or claim 2, wherein the multi-service network client comprises a single distribution package.
4. The cellular mobile device of any one of the preceding claims, wherein the VPN control application is configured to present a unified user interface for configuring anti-virus settings and personal firewall settings of the security manager.
5. The cellular mobile device of any one of the preceding claims,
wherein the security manager is configured to apply anti-virus and spyware services to the network packets,
wherein the security manager is configured to provide an interface by which the VPN handler determines whether a user of the cellular mobile device has activated and registered the security manager, and
wherein the VPN handler is configured to require an affirmative indication from the security manager prior to establishing the VPN connection with the VPN gateway.
7. The cellular mobile device of any one of the preceding claims, wherein the data acceleration module is configured to provide a local content cache.
8. The cellular mobile device of any one of the preceding claims, wherein the data acceleration module is configured to provide a client-side decompression service that operates in conjunction with an upstream acceleration device to provide real-time, continuous pattern recognition and compression of data flows within the network packets.
9. The cellular mobile device of any one of the preceding claims, wherein the data acceleration module is configured to provide application-specific protocol optimization for control flows within the network packets.
10. The cellular mobile device of any one of the preceding claims,
wherein the VPN handler is configured to establish a Secure Socket Layer, "SSL", control channel with the secure VPN gateway and, upon a successful authentication, to receive a session cookie with a unique identifier,
wherein the VPN handler is configured, in the event communication with the secure VPN gateway is temporarily lost, to perform a fast reconnect by issuing the session cookie to the secure VPN gateway, and
wherein the VPN handler is configured, when performing the fast reconnect, to identify a set of transport mechanisms currently available to the cellular mobile device and the VPN handler is configured, when only a cellular network is available and not a wireless packet-based connection, to defer the fast reconnect until application-layer data is received from a user application and ready to be sent via the VPN connection.
11. A system comprising:
a virtual private network, "VPN", security device coupled to a packet network; and
the cellular mobile device of any one of the preceding claims,
wherein the secure VPN device is configured to present an interface by which an administrator defines a plurality of different roles for the user,
wherein the secure VPN device is configured, upon authenticating the user, to select a subset of the roles for the user, and
wherein the secure VPN device is configured to control access to one or more protected resources by the user based on the selected subset of the roles.
12. A method comprising:
receiving, with a cellular mobile device from an electronic repository, a single distribution software package that includes a multi-service network client, wherein the multi-service network client includes a virtual private network, "VPN", handler, a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets, and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the security manager; and
installing the multi-service network client on the cellular mobile device including registering the VPN handler with an operating system of the cellular mobile device, wherein the VPN handler provides a single point of entry for network packets from the operating system to apply VPN services with the VPN handler and security services with the security manager.
13. The method of claim 12, further comprising:
establishing, with the VPN handler, a VPN connection with a remote VPN security device of an enterprise;
exchanging network packets between the VPN handler the operating system for communication via the VPN connection.
processing the network packets with the VPN handler to tunnel the packets between the cellular mobile device and the remote VPN security device over the VPN connection; and
while processing the packets with the VPN handler, routing the packets to the security manager and applying at least one security service to the network packets with the security manager.
14. A computer program product comprising software program code to execute a multi-service network client on a processor within a cellular device, wherein the multi-service network client comprises:
a virtual private network, "VPN", handler to establish a VPN connection with a remote VPN security device, wherein the VPN handler encrypts outbound network packets and decrypts inbound network packets to securely tunnel the network packets between the cellular mobile device and the remote VPN security device;
a data acceleration module that exchanges network packets with the VPN handler and applies at least one acceleration service to the network packets; and
a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the data acceleration module.
15. The computer program product of claim 14, wherein the multi-service network client further comprises a security manager to receive the decrypted inbound network packets from the VPN handler and apply at least one security service to the decrypted network packets.
EP11169538.3A 2010-06-30 2011-06-10 Multi-service vpn network client for mobile device having integrated acceleration Active EP2403206B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US39875810P 2010-06-30 2010-06-30
US12/968,015 US8549617B2 (en) 2010-06-30 2010-12-14 Multi-service VPN network client for mobile device having integrated acceleration

Publications (2)

Publication Number Publication Date
EP2403206A1 true EP2403206A1 (en) 2012-01-04
EP2403206B1 EP2403206B1 (en) 2017-11-22

Family

ID=44653682

Family Applications (1)

Application Number Title Priority Date Filing Date
EP11169538.3A Active EP2403206B1 (en) 2010-06-30 2011-06-10 Multi-service vpn network client for mobile device having integrated acceleration

Country Status (3)

Country Link
US (2) US8549617B2 (en)
EP (1) EP2403206B1 (en)
CN (1) CN102316094B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248549A (en) * 2013-05-03 2013-08-14 华示(上海)实业有限公司 Nationwide networking method for IVPNs (integrated virtual private networks) of large-and-medium-sized enterprises
CN104468315A (en) * 2014-12-16 2015-03-25 上海市共进通信技术有限公司 Method for accelerating VPN based on intelligent gateway
CN110049139A (en) * 2019-05-05 2019-07-23 广东电网有限责任公司 A kind of service broker's forwarding service system
US10452868B1 (en) 2019-02-04 2019-10-22 S2 Systems Corporation Web browser remoting using network vector rendering
US10552639B1 (en) 2019-02-04 2020-02-04 S2 Systems Corporation Local isolator application with cohesive application-isolation interface
US10558824B1 (en) 2019-02-04 2020-02-11 S2 Systems Corporation Application remoting using network vector rendering
US11314835B2 (en) 2019-02-04 2022-04-26 Cloudflare, Inc. Web browser remoting across a network using draw commands

Families Citing this family (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8418241B2 (en) 2006-11-14 2013-04-09 Broadcom Corporation Method and system for traffic engineering in secured networks
US8489685B2 (en) 2009-07-17 2013-07-16 Aryaka Networks, Inc. Application acceleration as a service system and method
US8549617B2 (en) 2010-06-30 2013-10-01 Juniper Networks, Inc. Multi-service VPN network client for mobile device having integrated acceleration
US8127350B2 (en) * 2010-06-30 2012-02-28 Juniper Networks, Inc. Multi-service VPN network client for mobile device
US10142292B2 (en) 2010-06-30 2018-11-27 Pulse Secure Llc Dual-mode multi-service VPN network client for mobile device
US8875223B1 (en) * 2011-08-31 2014-10-28 Palo Alto Networks, Inc. Configuring and managing remote security devices
US9215225B2 (en) 2013-03-29 2015-12-15 Citrix Systems, Inc. Mobile device locking with context
US8881229B2 (en) 2011-10-11 2014-11-04 Citrix Systems, Inc. Policy-based application management
US20140032733A1 (en) 2011-10-11 2014-01-30 Citrix Systems, Inc. Policy-Based Application Management
US9137262B2 (en) 2011-10-11 2015-09-15 Citrix Systems, Inc. Providing secure mobile device access to enterprise resources using application tunnels
US9280377B2 (en) 2013-03-29 2016-03-08 Citrix Systems, Inc. Application with multiple operation modes
US20140053234A1 (en) 2011-10-11 2014-02-20 Citrix Systems, Inc. Policy-Based Application Management
US10432587B2 (en) * 2012-02-21 2019-10-01 Aventail Llc VPN deep packet inspection
US9407443B2 (en) * 2012-06-05 2016-08-02 Lookout, Inc. Component analysis of software applications on computing devices
US20140108558A1 (en) 2012-10-12 2014-04-17 Citrix Systems, Inc. Application Management Framework for Secure Data Sharing in an Orchestration Framework for Connected Devices
US9516022B2 (en) 2012-10-14 2016-12-06 Getgo, Inc. Automated meeting room
US20140109171A1 (en) 2012-10-15 2014-04-17 Citrix Systems, Inc. Providing Virtualized Private Network tunnels
US20140109176A1 (en) 2012-10-15 2014-04-17 Citrix Systems, Inc. Configuring and providing profiles that manage execution of mobile applications
US8910239B2 (en) 2012-10-15 2014-12-09 Citrix Systems, Inc. Providing virtualized private network tunnels
US9606774B2 (en) 2012-10-16 2017-03-28 Citrix Systems, Inc. Wrapping an application with field-programmable business logic
US9170800B2 (en) 2012-10-16 2015-10-27 Citrix Systems, Inc. Application wrapping for application management framework
US9971585B2 (en) 2012-10-16 2018-05-15 Citrix Systems, Inc. Wrapping unmanaged applications on a mobile device
US20140108793A1 (en) 2012-10-16 2014-04-17 Citrix Systems, Inc. Controlling mobile device access to secure data
US9407548B2 (en) 2013-01-02 2016-08-02 Acceleration Systems, LLC ReNAT systems and methods
KR102103704B1 (en) 2013-01-02 2020-04-24 스카이캐스터, 엘엘씨 Systems and Methods for Providing a ReNAT Communications Environment
US9106634B2 (en) 2013-01-02 2015-08-11 Microsoft Technology Licensing, Llc Resource protection on un-trusted devices
US9369449B2 (en) 2013-03-29 2016-06-14 Citrix Systems, Inc. Providing an enterprise application store
US8813179B1 (en) 2013-03-29 2014-08-19 Citrix Systems, Inc. Providing mobile device management functionalities
US20140297840A1 (en) * 2013-03-29 2014-10-02 Citrix Systems, Inc. Providing mobile device management functionalities
US9985850B2 (en) 2013-03-29 2018-05-29 Citrix Systems, Inc. Providing mobile device management functionalities
US9355223B2 (en) 2013-03-29 2016-05-31 Citrix Systems, Inc. Providing a managed browser
US10284627B2 (en) 2013-03-29 2019-05-07 Citrix Systems, Inc. Data management for an application with multiple operation modes
US8849979B1 (en) 2013-03-29 2014-09-30 Citrix Systems, Inc. Providing mobile device management functionalities
US9306957B2 (en) * 2013-06-14 2016-04-05 Sap Se Proactive security system for distributed computer networks
US8997208B2 (en) 2013-08-15 2015-03-31 Mocana Corporation Gateway device for terminating a large volume of VPN connections
US9305163B2 (en) 2013-08-15 2016-04-05 Mocana Corporation User, device, and app authentication implemented between a client device and VPN gateway
US9473298B2 (en) 2013-08-15 2016-10-18 Blue Cedar Networks, Inc. Simplifying IKE process in a gateway to enable datapath scaling using a two tier cache configuration
US9531565B2 (en) * 2013-12-20 2016-12-27 Pismo Labs Technology Limited Methods and systems for transmitting and receiving packets
US9210129B2 (en) * 2014-02-06 2015-12-08 Acceleration Systems, LLC Systems and methods for providing a multiple secure link architecture
US20160352790A1 (en) * 2014-02-11 2016-12-01 Grey River Group, Llc Collaborative business communication information system
US9450862B2 (en) 2014-03-11 2016-09-20 Futurewei Technologies, Inc. Virtual private network migration and management in centrally controlled networks
US9794311B2 (en) * 2014-03-18 2017-10-17 Qualcomm Incorporated Transport accelerator implementing extended transmission control functionality
US20150350141A1 (en) 2014-05-31 2015-12-03 Apple Inc. Message user interfaces for capture and transmittal of media and location content
US9590962B2 (en) * 2014-07-07 2017-03-07 Alcatel-Lucent Usa Inc. Using cookies to identify security contexts for connectionless service
CN106605201B (en) 2014-08-06 2021-11-23 苹果公司 Reduced size user interface for battery management
EP4209872A1 (en) 2014-09-02 2023-07-12 Apple Inc. Phone user interface
KR102016160B1 (en) * 2014-09-02 2019-08-29 애플 인크. Reduced-size interfaces for managing alerts
US10075906B2 (en) 2014-11-19 2018-09-11 At&T Intellectual Property I, L.P. Facilitating dynamic private communication networks
US9749293B2 (en) * 2015-04-20 2017-08-29 Shoelace Wireless, Inc. Systems for improved mobile internet performance and security
EP3289510B1 (en) 2015-05-01 2020-06-17 Lookout Inc. Determining source of side-loaded software
US10455387B2 (en) * 2015-05-13 2019-10-22 CyberReef Solutions Inc. Network-based Machine-to-Machine (M2M) private networking system
US10868696B2 (en) 2015-06-17 2020-12-15 Blackberry Limited Managing VPN connectivity for data communications
US10320753B1 (en) * 2015-11-19 2019-06-11 Anonyome Labs, Inc. Method and system for providing persona masking in a computer network
US10206115B2 (en) 2016-05-31 2019-02-12 At&T Intellectual Property I, L.P. Wi-Fi virtualized network operator
US10178071B2 (en) * 2016-06-20 2019-01-08 Facebook, Inc. Techniques to use operating system redirection for network stream transformation operations
US10536338B2 (en) * 2016-07-07 2020-01-14 International Business Machines Corporation Networking connection resolution assistant
US10218697B2 (en) 2017-06-09 2019-02-26 Lookout, Inc. Use of device risk evaluation to manage access to services
US11012441B2 (en) * 2017-06-30 2021-05-18 Open Text Corporation Hybrid authentication systems and methods
US11283694B2 (en) * 2017-07-20 2022-03-22 Movius Interactive Corportion System and method providing usage analytics for a mobile device
EP3756335B1 (en) 2018-02-23 2023-07-19 InterDigital Patent Holdings, Inc. Device-initiated service deployment through mobile application packaging
CN110324282A (en) * 2018-03-29 2019-10-11 华耀(中国)科技有限公司 The load-balancing method and its system of SSL/TLS visualization flow
US10742595B2 (en) * 2018-04-20 2020-08-11 Pulse Secure, Llc Fully qualified domain name-based traffic control for virtual private network access control
US11005891B2 (en) * 2018-11-12 2021-05-11 Citrix Systems, Inc. Systems and methods for live SaaS objects
US11283763B2 (en) 2018-12-28 2022-03-22 Mcafee, Llc On-device dynamic safe browsing
US11362999B2 (en) * 2019-03-29 2022-06-14 Mcafee, Llc Client-only virtual private network
US11405237B2 (en) 2019-03-29 2022-08-02 Mcafee, Llc Unencrypted client-only virtual private network
US11152100B2 (en) 2019-06-01 2021-10-19 Apple Inc. Health application user interfaces
US11323445B2 (en) * 2019-12-03 2022-05-03 Blackberry Limited Methods and systems for accessing a network
CN111277607A (en) * 2020-02-14 2020-06-12 南京南瑞信息通信科技有限公司 Communication tunnel module, application monitoring module and mobile terminal security access system
CN111629403B (en) * 2020-04-24 2022-10-11 四川速宝网络科技有限公司 Host game acceleration method and system
US20220200962A1 (en) * 2020-12-19 2022-06-23 Jpmorgan Chase Bank, N.A. Method and system for providing an enterprise software distribution platform
CN114765580B (en) * 2020-12-30 2023-11-03 腾讯科技(深圳)有限公司 Network acceleration method, device, equipment and storage medium for off-domain network resources
WO2022176153A1 (en) * 2021-02-19 2022-08-25 京セラ株式会社 Image processing device
US11144978B1 (en) * 2021-02-25 2021-10-12 Mythical, Inc. Systems and methods to support custom bundling of virtual items within an online game
US11444911B1 (en) * 2022-02-22 2022-09-13 Oversec, Uab Domain name system configuration during virtual private network connection

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6856651B2 (en) 2000-07-25 2005-02-15 Peribit Networks, Inc. System and method for incremental and continuous data compression
WO2006074072A2 (en) * 2004-12-30 2006-07-13 Citrix Systems, Inc. Systems and methods for providing client-side acceleration techniques
WO2008017064A2 (en) * 2006-08-03 2008-02-07 Citrix Systems, Inc. Systems and methods for using an http-aware client agent

Family Cites Families (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6885864B2 (en) * 1992-03-06 2005-04-26 Aircell, Inc. Virtual private network for cellular communications
US6751190B1 (en) 1999-05-18 2004-06-15 Cisco Technology, Inc. Multihop nested tunnel restoration
US6496702B1 (en) * 1999-08-06 2002-12-17 Genesys Telecommunications Laboratories, Inc. Method and apparatus for providing enhanced communication capability for mobile devices on a virtual private network (VPN)
US6675225B1 (en) 1999-08-26 2004-01-06 International Business Machines Corporation Method and system for algorithm-based address-evading network snoop avoider
US6473863B1 (en) 1999-10-28 2002-10-29 International Business Machines Corporation Automatic virtual private network internet snoop avoider
US6751621B1 (en) * 2000-01-27 2004-06-15 Manning & Napier Information Services, Llc. Construction of trainable semantic vectors and clustering, classification, and searching using trainable semantic vectors
JP4201466B2 (en) * 2000-07-26 2008-12-24 富士通株式会社 VPN system and VPN setting method in mobile IP network
US8250357B2 (en) 2000-09-13 2012-08-21 Fortinet, Inc. Tunnel interface for securing traffic over a network
US7155518B2 (en) * 2001-01-08 2006-12-26 Interactive People Unplugged Ab Extranet workgroup formation across multiple mobile virtual private networks
US6804665B2 (en) * 2001-04-18 2004-10-12 International Business Machines Corporation Method and apparatus for discovering knowledge gaps between problems and solutions in text databases
ITMI20021463A1 (en) * 2001-07-03 2004-01-02 Samsung Electronics Co Ltd PROCEDURE FOR THE TRANSMISSION OF DATA FROM THE SERVER OF A PRIVATE VIRTUAL NETWORK TO A MOBILE NODE
US7107464B2 (en) 2001-07-10 2006-09-12 Telecom Italia S.P.A. Virtual private network mechanism incorporating security association processor
WO2003015369A2 (en) 2001-08-07 2003-02-20 Innominate Security Technologies Ag Method and computer system for securing communication in networks
KR100407324B1 (en) * 2001-10-26 2003-11-28 삼성전자주식회사 Method for transferring data form a server of virtual private network to mobile node
US7647422B2 (en) 2001-11-06 2010-01-12 Enterasys Networks, Inc. VPN failure recovery
AU2003201231A1 (en) 2002-01-04 2003-07-30 Lab 7 Networks, Inc. Communication security system
JP3700671B2 (en) 2002-04-10 2005-09-28 横河電機株式会社 Security management system
US7536720B2 (en) * 2002-05-07 2009-05-19 Nortel Networks Limited Method and apparatus for accelerating CPE-based VPN transmissions over a wireless network
US7246232B2 (en) * 2002-05-31 2007-07-17 Sri International Methods and apparatus for scalable distributed management of wireless virtual private networks
WO2004036834A1 (en) * 2002-10-17 2004-04-29 Nokia Corporation Secured virtual private network with mobile nodes
WO2004049113A2 (en) 2002-11-21 2004-06-10 America Online, Inc. Multiple personalities
US7616597B2 (en) * 2002-12-19 2009-11-10 Intel Corporation System and method for integrating mobile networking with security-based VPNs
US7315902B2 (en) * 2002-12-19 2008-01-01 International Business Machines Corporation Compression and abbreviation for fixed length messaging
US20040168051A1 (en) * 2003-02-26 2004-08-26 Lucent Technologies Inc. Optimally provisioning connectivity for network-based mobile virtual private network (VPN) services
US20080109679A1 (en) 2003-02-28 2008-05-08 Michael Wright Administration of protection of data accessible by a mobile device
KR100543451B1 (en) * 2003-04-17 2006-01-23 삼성전자주식회사 Method and apparatus for hybrid network device performing virtual private network and wireless local area network
US7478427B2 (en) 2003-05-05 2009-01-13 Alcatel-Lucent Usa Inc. Method and apparatus for providing adaptive VPN to enable different security levels in virtual private networks (VPNs)
WO2005004437A1 (en) 2003-06-25 2005-01-13 Hotspot Wireless Devices, Inc. Systems and metods using multiprotocol communication
US7444508B2 (en) 2003-06-30 2008-10-28 Nokia Corporation Method of implementing secure access
US20050015455A1 (en) 2003-07-18 2005-01-20 Liu Gary G. SPAM processing system and methods including shared information among plural SPAM filters
US8745515B2 (en) 2004-04-07 2014-06-03 Nokia Corporation Presentation of large pages on small displays
US7734907B2 (en) 2003-12-08 2010-06-08 Symantec Corporation Methods and systems for redirecting data
TWI236255B (en) * 2003-12-15 2005-07-11 Ind Tech Res Inst System and method for supporting inter-NAT-domain handoff within a VPN by associating L2TP with mobile IP
JP2007518349A (en) * 2004-01-15 2007-07-05 インタラクティブ ピープル アンプラグド アクチボラグ Equipment that facilitates deployment to medium / large enterprise networks of mobile virtual private networks
US20050198498A1 (en) 2004-03-02 2005-09-08 International Business Machines Corporation System and method for performing cryptographic operations on network data
KR20050090902A (en) * 2004-03-10 2005-09-14 삼성전자주식회사 The method of vpn service about pdp type in wcdma
US7457626B2 (en) * 2004-03-19 2008-11-25 Microsoft Corporation Virtual private network structure reuse for mobile computing devices
KR100595663B1 (en) 2004-04-13 2006-07-03 엘지전자 주식회사 Video file compression/expansion method for mobile phone
US7757074B2 (en) 2004-06-30 2010-07-13 Citrix Application Networking, Llc System and method for establishing a virtual private network
TWI271076B (en) 2004-07-02 2007-01-11 Icp Electronics Inc Security gateway with SSL protection and method for the same
US20060023861A1 (en) * 2004-07-27 2006-02-02 Greg Carlson Effecting VPN capability among wireless subscribers
US7477626B2 (en) * 2004-09-24 2009-01-13 Zyxel Communications Corporation Apparatus of dynamically assigning external home agent for mobile virtual private networks and method for the same
US7486951B2 (en) * 2004-09-24 2009-02-03 Zyxel Communications Corporation Apparatus of dynamically assigning external home agent for mobile virtual private networks and method for the same
KR100918440B1 (en) * 2004-11-12 2009-09-24 삼성전자주식회사 Method and apparatus for communicating of mobile node in virtual private network vpn using ip address of vpn gateway
US7810089B2 (en) 2004-12-30 2010-10-05 Citrix Systems, Inc. Systems and methods for automatic installation and execution of a client-side acceleration program
US8549149B2 (en) 2004-12-30 2013-10-01 Citrix Systems, Inc. Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing
US8341404B2 (en) * 2005-02-18 2012-12-25 Credant Technologies, Inc. System and method for intelligence based security
US7376113B2 (en) * 2005-04-01 2008-05-20 Arubs Networks, Inc. Mechanism for securely extending a private network
US20060230445A1 (en) * 2005-04-06 2006-10-12 Shun-Chao Huang Mobile VPN proxy method based on session initiation protocol
US8411650B2 (en) * 2005-04-18 2013-04-02 Cisco Technology, Inc. Method and system for providing virtual private network services through a mobile IP home agent
US7565689B2 (en) 2005-06-08 2009-07-21 Research In Motion Limited Virtual private network for real-time data
US20070006295A1 (en) * 2005-06-24 2007-01-04 Henry Haverinen Adaptive IPsec processing in mobile-enhanced virtual private networks
US7602786B2 (en) * 2005-07-07 2009-10-13 Cisco Technology, Inc. Methods and apparatus for optimizing mobile VPN communications
US8166538B2 (en) 2005-07-08 2012-04-24 Microsoft Corporation Unified architecture for remote network access
US20070177550A1 (en) * 2005-07-12 2007-08-02 Hyeok Chan Kwon Method for providing virtual private network services to mobile node in IPv6 network and gateway using the same
US8316226B1 (en) 2005-09-14 2012-11-20 Juniper Networks, Inc. Adaptive transition between layer three and layer four network tunnels
US20070074283A1 (en) 2005-09-26 2007-03-29 Marian Croak Method and apparatus for activating alternative virtual private network protocols
US8001610B1 (en) 2005-09-28 2011-08-16 Juniper Networks, Inc. Network defense system utilizing endpoint health indicators and user identity
US7590123B2 (en) 2005-11-22 2009-09-15 Cisco Technology, Inc. Method of providing an encrypted multipoint VPN service
US7882557B2 (en) * 2005-11-23 2011-02-01 Research In Motion Limited System and method to provide built-in and mobile VPN connectivity
US20070124803A1 (en) * 2005-11-29 2007-05-31 Nortel Networks Limited Method and apparatus for rating a compliance level of a computer connecting to a network
US7873001B2 (en) * 2006-03-02 2011-01-18 Tango Networks, Inc. System and method for enabling VPN-less session setup for connecting mobile data devices to an enterprise data network
CN101043512A (en) 2006-03-21 2007-09-26 环达电脑(上海)有限公司 Electronic mail system
WO2007110094A1 (en) 2006-03-27 2007-10-04 Telecom Italia S.P.A. System for enforcing security policies on mobile communications devices
US9137043B2 (en) 2006-06-27 2015-09-15 International Business Machines Corporation System, method and program for determining a network path by which to send a message
US8561155B2 (en) 2006-08-03 2013-10-15 Citrix Systems, Inc. Systems and methods for using a client agent to manage HTTP authentication cookies
US8032150B2 (en) 2006-09-29 2011-10-04 Globalfoundries Inc. Connection manager with location learning
JPWO2008041357A1 (en) 2006-09-29 2010-02-04 株式会社Access Document processing apparatus and program
EP1993254A1 (en) * 2007-05-16 2008-11-19 Doga Armangil A method and a system for the composition of services
US9398453B2 (en) 2007-08-17 2016-07-19 Qualcomm Incorporated Ad hoc service provider's ability to provide service for a wireless network
US8020203B2 (en) 2007-12-03 2011-09-13 Novell, Inc. Techniques for high availability of virtual private networks (VPN's)
US7979565B2 (en) * 2008-08-27 2011-07-12 International Business Machines Corporation System and method to provide a network service
US8209749B2 (en) 2008-09-17 2012-06-26 Apple Inc. Uninterrupted virtual private network (VPN) connection service with dynamic policy enforcement
CN101686256A (en) 2008-09-27 2010-03-31 北京掌易迅移动软件技术有限责任公司 Safety framework of mobile service platform
CN101719815A (en) * 2010-02-20 2010-06-02 朴君 Method for accelerating VPN multi-route network
US8549617B2 (en) 2010-06-30 2013-10-01 Juniper Networks, Inc. Multi-service VPN network client for mobile device having integrated acceleration
US8127350B2 (en) 2010-06-30 2012-02-28 Juniper Networks, Inc. Multi-service VPN network client for mobile device
US8464336B2 (en) 2010-06-30 2013-06-11 Juniper Networks, Inc. VPN network client for mobile device having fast reconnect
US10142292B2 (en) 2010-06-30 2018-11-27 Pulse Secure Llc Dual-mode multi-service VPN network client for mobile device
US8458787B2 (en) 2010-06-30 2013-06-04 Juniper Networks, Inc. VPN network client for mobile device having dynamically translated user home page
US8473734B2 (en) 2010-06-30 2013-06-25 Juniper Networks, Inc. Multi-service VPN network client for mobile device having dynamic failover
US8474035B2 (en) 2010-06-30 2013-06-25 Juniper Networks, Inc. VPN network client for mobile device having dynamically constructed display for native access to web mail
US8553662B2 (en) 2010-08-20 2013-10-08 Time Warner Cable Inc. System and method for Wi-Fi roaming
WO2013048507A1 (en) 2011-09-30 2013-04-04 Intel Corporation Device, system and method of maintaining connectivity over a virtual private network (vpn)
US8555364B2 (en) 2011-09-30 2013-10-08 Time Warner Cable Enterprises Llc System and method for cloning a wi-fi access point
US8875277B2 (en) 2012-06-04 2014-10-28 Google Inc. Forcing all mobile network traffic over a secure tunnel connection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6856651B2 (en) 2000-07-25 2005-02-15 Peribit Networks, Inc. System and method for incremental and continuous data compression
WO2006074072A2 (en) * 2004-12-30 2006-07-13 Citrix Systems, Inc. Systems and methods for providing client-side acceleration techniques
WO2008017064A2 (en) * 2006-08-03 2008-02-07 Citrix Systems, Inc. Systems and methods for using an http-aware client agent

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248549A (en) * 2013-05-03 2013-08-14 华示(上海)实业有限公司 Nationwide networking method for IVPNs (integrated virtual private networks) of large-and-medium-sized enterprises
CN104468315A (en) * 2014-12-16 2015-03-25 上海市共进通信技术有限公司 Method for accelerating VPN based on intelligent gateway
US10579829B1 (en) 2019-02-04 2020-03-03 S2 Systems Corporation Application remoting using network vector rendering
US10452868B1 (en) 2019-02-04 2019-10-22 S2 Systems Corporation Web browser remoting using network vector rendering
US10552639B1 (en) 2019-02-04 2020-02-04 S2 Systems Corporation Local isolator application with cohesive application-isolation interface
US10558824B1 (en) 2019-02-04 2020-02-11 S2 Systems Corporation Application remoting using network vector rendering
US10650166B1 (en) 2019-02-04 2020-05-12 Cloudflare, Inc. Application remoting using network vector rendering
US11314835B2 (en) 2019-02-04 2022-04-26 Cloudflare, Inc. Web browser remoting across a network using draw commands
US11675930B2 (en) 2019-02-04 2023-06-13 Cloudflare, Inc. Remoting application across a network using draw commands with an isolator application
US11687610B2 (en) 2019-02-04 2023-06-27 Cloudflare, Inc. Application remoting across a network using draw commands
US11741179B2 (en) 2019-02-04 2023-08-29 Cloudflare, Inc. Web browser remoting across a network using draw commands
US11880422B2 (en) 2019-02-04 2024-01-23 Cloudflare, Inc. Theft prevention for sensitive information
CN110049139A (en) * 2019-05-05 2019-07-23 广东电网有限责任公司 A kind of service broker's forwarding service system
CN110049139B (en) * 2019-05-05 2022-06-14 广东电网有限责任公司 Service proxy forwarding service system

Also Published As

Publication number Publication date
US9363235B2 (en) 2016-06-07
EP2403206B1 (en) 2017-11-22
CN102316094B (en) 2015-06-24
US20140029750A1 (en) 2014-01-30
US20120005476A1 (en) 2012-01-05
US8549617B2 (en) 2013-10-01
CN102316094A (en) 2012-01-11

Similar Documents

Publication Publication Date Title
EP2403210B1 (en) VPN Network Client for Mobile Device Having Dynamically Translated User Home Page
EP2403211B1 (en) Dual-mode multi-service vpn network client for mobile device
US9363235B2 (en) Multi-service VPN network client for mobile device having integrated acceleration
EP2403208B1 (en) Multi-service VPN network client for mobile device having dynamic failover
US8949968B2 (en) Multi-service VPN network client for mobile device
EP2403207B1 (en) Vpn network client for mobile device having fast reconnect
US8474035B2 (en) VPN network client for mobile device having dynamically constructed display for native access to web mail
US9398010B1 (en) Provisioning layer two network access for mobile devices
US7188243B2 (en) System and method for over the air configuration security
US8479266B1 (en) Network assignment appeal architecture and process
US20100223462A1 (en) Method and device for accessing services and files

Legal Events

Date Code Title Description
AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120627

17Q First examination report despatched

Effective date: 20130916

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: PULSE SECURE, LLC

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602011043518

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: H04L0029060000

Ipc: H04W0012060000

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20170512

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 12/46 20060101ALI20170503BHEP

Ipc: H04W 76/02 20090101ALI20170503BHEP

Ipc: H04L 29/06 20060101ALI20170503BHEP

Ipc: H04W 12/06 20090101AFI20170503BHEP

Ipc: H04L 12/24 20060101ALI20170503BHEP

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAJ Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR1

GRAL Information related to payment of fee for publishing/printing deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR3

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

GRAR Information related to intention to grant a patent recorded

Free format text: ORIGINAL CODE: EPIDOSNIGR71

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

INTC Intention to grant announced (deleted)
INTG Intention to grant announced

Effective date: 20171012

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 949442

Country of ref document: AT

Kind code of ref document: T

Effective date: 20171215

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602011043518

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20171122

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 949442

Country of ref document: AT

Kind code of ref document: T

Effective date: 20171122

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180222

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180223

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180222

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 8

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602011043518

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20180823

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20180630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180610

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180630

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180610

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20110610

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20171122

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20171122

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180322

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IE

Payment date: 20210521

Year of fee payment: 11

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220610

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230529

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20230523

Year of fee payment: 13

Ref country code: DE

Payment date: 20230523

Year of fee payment: 13

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230523

Year of fee payment: 13